Apr 12 18:31:17.020390 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:31:17.020409 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:31:17.020417 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Apr 12 18:31:17.020424 kernel: printk: bootconsole [pl11] enabled Apr 12 18:31:17.020429 kernel: efi: EFI v2.70 by EDK II Apr 12 18:31:17.020434 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Apr 12 18:31:17.020441 kernel: random: crng init done Apr 12 18:31:17.020446 kernel: ACPI: Early table checksum verification disabled Apr 12 18:31:17.020452 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Apr 12 18:31:17.020457 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020462 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020469 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Apr 12 18:31:17.020474 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020480 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020486 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020492 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020498 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020505 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020511 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Apr 12 18:31:17.020517 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:31:17.020522 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Apr 12 18:31:17.020571 kernel: NUMA: Failed to initialise from firmware Apr 12 18:31:17.020578 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:31:17.020583 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Apr 12 18:31:17.020589 kernel: Zone ranges: Apr 12 18:31:17.020595 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Apr 12 18:31:17.020601 kernel: DMA32 empty Apr 12 18:31:17.020609 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:31:17.020614 kernel: Movable zone start for each node Apr 12 18:31:17.020620 kernel: Early memory node ranges Apr 12 18:31:17.020625 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Apr 12 18:31:17.020631 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Apr 12 18:31:17.020637 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Apr 12 18:31:17.020642 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Apr 12 18:31:17.020648 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Apr 12 18:31:17.020654 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Apr 12 18:31:17.020659 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Apr 12 18:31:17.020665 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Apr 12 18:31:17.020671 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:31:17.020678 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:31:17.020686 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Apr 12 18:31:17.020692 kernel: psci: probing for conduit method from ACPI. Apr 12 18:31:17.020698 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:31:17.020704 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:31:17.020711 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 18:31:17.020717 kernel: psci: SMC Calling Convention v1.4 Apr 12 18:31:17.020723 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Apr 12 18:31:17.020729 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Apr 12 18:31:17.020735 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:31:17.020741 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:31:17.020748 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:31:17.020754 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:31:17.020760 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:31:17.020766 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:31:17.020772 kernel: CPU features: detected: Spectre-BHB Apr 12 18:31:17.020778 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:31:17.020785 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:31:17.020791 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:31:17.020797 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Apr 12 18:31:17.020803 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Apr 12 18:31:17.020809 kernel: Policy zone: Normal Apr 12 18:31:17.020817 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:17.020823 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:31:17.020829 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:31:17.020835 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:31:17.020841 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:31:17.020849 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Apr 12 18:31:17.020855 kernel: Memory: 3990260K/4194160K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 203900K reserved, 0K cma-reserved) Apr 12 18:31:17.020861 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:31:17.020868 kernel: trace event string verifier disabled Apr 12 18:31:17.020874 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:31:17.020880 kernel: rcu: RCU event tracing is enabled. Apr 12 18:31:17.020887 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:31:17.020893 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:31:17.020899 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:31:17.020906 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:31:17.020912 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:31:17.020919 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:31:17.020925 kernel: GICv3: 960 SPIs implemented Apr 12 18:31:17.020931 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:31:17.020937 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:31:17.020943 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:31:17.020949 kernel: GICv3: 16 PPIs implemented Apr 12 18:31:17.020955 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Apr 12 18:31:17.020961 kernel: ITS: No ITS available, not enabling LPIs Apr 12 18:31:17.020968 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:17.020974 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:31:17.020980 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:31:17.020986 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:31:17.020993 kernel: Console: colour dummy device 80x25 Apr 12 18:31:17.021000 kernel: printk: console [tty1] enabled Apr 12 18:31:17.021006 kernel: ACPI: Core revision 20210730 Apr 12 18:31:17.021013 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:31:17.021019 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:31:17.021025 kernel: LSM: Security Framework initializing Apr 12 18:31:17.021031 kernel: SELinux: Initializing. Apr 12 18:31:17.021038 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:17.021044 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:17.021052 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Apr 12 18:31:17.021058 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Apr 12 18:31:17.021065 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:31:17.021071 kernel: Remapping and enabling EFI services. Apr 12 18:31:17.021077 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:31:17.021083 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:31:17.021090 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Apr 12 18:31:17.021096 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:17.021102 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:31:17.021109 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:31:17.021116 kernel: SMP: Total of 2 processors activated. Apr 12 18:31:17.021122 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:31:17.021129 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Apr 12 18:31:17.021135 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:31:17.021141 kernel: CPU features: detected: CRC32 instructions Apr 12 18:31:17.021148 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:31:17.021154 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:31:17.021160 kernel: CPU features: detected: Privileged Access Never Apr 12 18:31:17.021167 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:31:17.021174 kernel: alternatives: patching kernel code Apr 12 18:31:17.021184 kernel: devtmpfs: initialized Apr 12 18:31:17.021192 kernel: KASLR enabled Apr 12 18:31:17.021198 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:31:17.021205 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:31:17.021211 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:31:17.021218 kernel: SMBIOS 3.1.0 present. Apr 12 18:31:17.021225 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Apr 12 18:31:17.021231 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:31:17.021239 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:31:17.021246 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:31:17.021252 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:31:17.021259 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:31:17.021266 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Apr 12 18:31:17.021272 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:31:17.021279 kernel: cpuidle: using governor menu Apr 12 18:31:17.021287 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:31:17.021293 kernel: ASID allocator initialised with 32768 entries Apr 12 18:31:17.021300 kernel: ACPI: bus type PCI registered Apr 12 18:31:17.021306 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:31:17.021313 kernel: Serial: AMBA PL011 UART driver Apr 12 18:31:17.021320 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:31:17.021326 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:31:17.021333 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:31:17.021340 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:31:17.021347 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:31:17.021354 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:31:17.021360 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:31:17.021367 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:31:17.021374 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:31:17.021380 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:31:17.021387 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:31:17.021393 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:31:17.021400 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:31:17.021408 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:31:17.021414 kernel: ACPI: Interpreter enabled Apr 12 18:31:17.021421 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:31:17.021427 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:31:17.021434 kernel: printk: console [ttyAMA0] enabled Apr 12 18:31:17.021440 kernel: printk: bootconsole [pl11] disabled Apr 12 18:31:17.021447 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Apr 12 18:31:17.021454 kernel: iommu: Default domain type: Translated Apr 12 18:31:17.021460 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:31:17.021468 kernel: vgaarb: loaded Apr 12 18:31:17.021475 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:31:17.021481 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:31:17.021488 kernel: PTP clock support registered Apr 12 18:31:17.021495 kernel: Registered efivars operations Apr 12 18:31:17.021501 kernel: No ACPI PMU IRQ for CPU0 Apr 12 18:31:17.021508 kernel: No ACPI PMU IRQ for CPU1 Apr 12 18:31:17.021514 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:31:17.021521 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:31:17.021556 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:31:17.021563 kernel: pnp: PnP ACPI init Apr 12 18:31:17.021570 kernel: pnp: PnP ACPI: found 0 devices Apr 12 18:31:17.021576 kernel: NET: Registered PF_INET protocol family Apr 12 18:31:17.021583 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:31:17.021589 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:31:17.021596 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:31:17.021603 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:31:17.021610 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:31:17.021618 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:31:17.021624 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:17.021631 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:17.021638 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:31:17.021644 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:31:17.021651 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Apr 12 18:31:17.021657 kernel: kvm [1]: HYP mode not available Apr 12 18:31:17.021664 kernel: Initialise system trusted keyrings Apr 12 18:31:17.021671 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:31:17.021678 kernel: Key type asymmetric registered Apr 12 18:31:17.021685 kernel: Asymmetric key parser 'x509' registered Apr 12 18:31:17.021691 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:31:17.021698 kernel: io scheduler mq-deadline registered Apr 12 18:31:17.021704 kernel: io scheduler kyber registered Apr 12 18:31:17.021711 kernel: io scheduler bfq registered Apr 12 18:31:17.021718 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:31:17.021724 kernel: thunder_xcv, ver 1.0 Apr 12 18:31:17.021731 kernel: thunder_bgx, ver 1.0 Apr 12 18:31:17.021738 kernel: nicpf, ver 1.0 Apr 12 18:31:17.021746 kernel: nicvf, ver 1.0 Apr 12 18:31:17.021874 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:31:17.021935 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:31:16 UTC (1712946676) Apr 12 18:31:17.021944 kernel: efifb: probing for efifb Apr 12 18:31:17.021951 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Apr 12 18:31:17.021958 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Apr 12 18:31:17.021964 kernel: efifb: scrolling: redraw Apr 12 18:31:17.021973 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 18:31:17.021980 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:31:17.021986 kernel: fb0: EFI VGA frame buffer device Apr 12 18:31:17.021993 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Apr 12 18:31:17.022000 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:31:17.022006 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:31:17.022013 kernel: Segment Routing with IPv6 Apr 12 18:31:17.022019 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:31:17.022026 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:31:17.022034 kernel: Key type dns_resolver registered Apr 12 18:31:17.022041 kernel: registered taskstats version 1 Apr 12 18:31:17.022047 kernel: Loading compiled-in X.509 certificates Apr 12 18:31:17.022054 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:31:17.022061 kernel: Key type .fscrypt registered Apr 12 18:31:17.022067 kernel: Key type fscrypt-provisioning registered Apr 12 18:31:17.022074 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:31:17.022081 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:31:17.022087 kernel: ima: No architecture policies found Apr 12 18:31:17.022095 kernel: Freeing unused kernel memory: 36352K Apr 12 18:31:17.022102 kernel: Run /init as init process Apr 12 18:31:17.022108 kernel: with arguments: Apr 12 18:31:17.022115 kernel: /init Apr 12 18:31:17.022121 kernel: with environment: Apr 12 18:31:17.022128 kernel: HOME=/ Apr 12 18:31:17.022134 kernel: TERM=linux Apr 12 18:31:17.022141 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:31:17.022149 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:17.022159 systemd[1]: Detected virtualization microsoft. Apr 12 18:31:17.022166 systemd[1]: Detected architecture arm64. Apr 12 18:31:17.022173 systemd[1]: Running in initrd. Apr 12 18:31:17.022180 systemd[1]: No hostname configured, using default hostname. Apr 12 18:31:17.022187 systemd[1]: Hostname set to . Apr 12 18:31:17.022194 systemd[1]: Initializing machine ID from random generator. Apr 12 18:31:17.022201 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:31:17.022209 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:17.022217 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:17.022224 systemd[1]: Reached target paths.target. Apr 12 18:31:17.022230 systemd[1]: Reached target slices.target. Apr 12 18:31:17.022237 systemd[1]: Reached target swap.target. Apr 12 18:31:17.022244 systemd[1]: Reached target timers.target. Apr 12 18:31:17.022251 systemd[1]: Listening on iscsid.socket. Apr 12 18:31:17.022258 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:31:17.022266 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:31:17.022273 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:31:17.022280 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:31:17.022287 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:17.022294 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:17.022301 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:17.022308 systemd[1]: Reached target sockets.target. Apr 12 18:31:17.022316 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:17.022323 systemd[1]: Finished network-cleanup.service. Apr 12 18:31:17.022331 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:31:17.022338 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:17.022345 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:17.022352 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:17.022359 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:31:17.022371 systemd-journald[236]: Journal started Apr 12 18:31:17.022408 systemd-journald[236]: Runtime Journal (/run/log/journal/e0d2975362614155805799a617e71c6e) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:31:17.006166 systemd-modules-load[237]: Inserted module 'overlay' Apr 12 18:31:17.052304 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:31:17.065098 systemd[1]: Started systemd-journald.service. Apr 12 18:31:17.065163 kernel: Bridge firewalling registered Apr 12 18:31:17.065251 systemd-modules-load[237]: Inserted module 'br_netfilter' Apr 12 18:31:17.116181 kernel: audit: type=1130 audit(1712946677.071:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.116207 kernel: SCSI subsystem initialized Apr 12 18:31:17.116216 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:31:17.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.069449 systemd-resolved[238]: Positive Trust Anchors: Apr 12 18:31:17.069457 systemd-resolved[238]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:17.212961 kernel: audit: type=1130 audit(1712946677.120:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.212986 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:31:17.212995 kernel: audit: type=1130 audit(1712946677.149:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.213004 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:31:17.213020 kernel: audit: type=1130 audit(1712946677.184:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.069484 systemd-resolved[238]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:17.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.095895 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:17.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.096073 systemd-resolved[238]: Defaulting to hostname 'linux'. Apr 12 18:31:17.296247 kernel: audit: type=1130 audit(1712946677.232:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.296269 kernel: audit: type=1130 audit(1712946677.267:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.120797 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:17.149639 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:31:17.184781 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:31:17.201642 systemd-modules-load[237]: Inserted module 'dm_multipath' Apr 12 18:31:17.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.232939 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:17.368085 kernel: audit: type=1130 audit(1712946677.335:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.267725 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:17.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.295858 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:31:17.418377 kernel: audit: type=1130 audit(1712946677.361:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.418402 kernel: audit: type=1130 audit(1712946677.388:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.304177 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:17.321568 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:31:17.427951 dracut-cmdline[258]: dracut-dracut-053 Apr 12 18:31:17.427951 dracut-cmdline[258]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:17.331207 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:31:17.336179 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:17.362251 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:31:17.389679 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:31:17.503548 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:31:17.516551 kernel: iscsi: registered transport (tcp) Apr 12 18:31:17.537712 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:31:17.537774 kernel: QLogic iSCSI HBA Driver Apr 12 18:31:17.569897 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:31:17.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.575408 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:31:17.627557 kernel: raid6: neonx8 gen() 13822 MB/s Apr 12 18:31:17.647538 kernel: raid6: neonx8 xor() 10827 MB/s Apr 12 18:31:17.667536 kernel: raid6: neonx4 gen() 13562 MB/s Apr 12 18:31:17.688537 kernel: raid6: neonx4 xor() 11306 MB/s Apr 12 18:31:17.708535 kernel: raid6: neonx2 gen() 12933 MB/s Apr 12 18:31:17.728536 kernel: raid6: neonx2 xor() 10345 MB/s Apr 12 18:31:17.749536 kernel: raid6: neonx1 gen() 10557 MB/s Apr 12 18:31:17.769535 kernel: raid6: neonx1 xor() 8721 MB/s Apr 12 18:31:17.789535 kernel: raid6: int64x8 gen() 6265 MB/s Apr 12 18:31:17.813536 kernel: raid6: int64x8 xor() 3543 MB/s Apr 12 18:31:17.833535 kernel: raid6: int64x4 gen() 7245 MB/s Apr 12 18:31:17.853535 kernel: raid6: int64x4 xor() 3859 MB/s Apr 12 18:31:17.874536 kernel: raid6: int64x2 gen() 6155 MB/s Apr 12 18:31:17.894538 kernel: raid6: int64x2 xor() 3325 MB/s Apr 12 18:31:17.914536 kernel: raid6: int64x1 gen() 5040 MB/s Apr 12 18:31:17.940060 kernel: raid6: int64x1 xor() 2643 MB/s Apr 12 18:31:17.940071 kernel: raid6: using algorithm neonx8 gen() 13822 MB/s Apr 12 18:31:17.940079 kernel: raid6: .... xor() 10827 MB/s, rmw enabled Apr 12 18:31:17.944267 kernel: raid6: using neon recovery algorithm Apr 12 18:31:17.961539 kernel: xor: measuring software checksum speed Apr 12 18:31:17.969934 kernel: 8regs : 17304 MB/sec Apr 12 18:31:17.969944 kernel: 32regs : 20755 MB/sec Apr 12 18:31:17.973986 kernel: arm64_neon : 27997 MB/sec Apr 12 18:31:17.974004 kernel: xor: using function: arm64_neon (27997 MB/sec) Apr 12 18:31:18.035546 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:31:18.046581 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:31:18.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.054000 audit: BPF prog-id=7 op=LOAD Apr 12 18:31:18.054000 audit: BPF prog-id=8 op=LOAD Apr 12 18:31:18.055552 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:18.070489 systemd-udevd[435]: Using default interface naming scheme 'v252'. Apr 12 18:31:18.076738 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:18.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.088017 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:31:18.103777 dracut-pre-trigger[456]: rd.md=0: removing MD RAID activation Apr 12 18:31:18.141425 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:31:18.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.147306 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:18.182692 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:18.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.237551 kernel: hv_vmbus: Vmbus version:5.3 Apr 12 18:31:18.249552 kernel: hv_vmbus: registering driver hid_hyperv Apr 12 18:31:18.249610 kernel: hv_vmbus: registering driver hyperv_keyboard Apr 12 18:31:18.250546 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Apr 12 18:31:18.268821 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Apr 12 18:31:18.277155 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Apr 12 18:31:18.277322 kernel: hv_vmbus: registering driver hv_netvsc Apr 12 18:31:18.289551 kernel: hv_vmbus: registering driver hv_storvsc Apr 12 18:31:18.301477 kernel: scsi host0: storvsc_host_t Apr 12 18:31:18.301713 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Apr 12 18:31:18.307380 kernel: scsi host1: storvsc_host_t Apr 12 18:31:18.308556 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Apr 12 18:31:18.347160 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Apr 12 18:31:18.347491 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:31:18.348557 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Apr 12 18:31:18.354550 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Apr 12 18:31:18.354706 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 18:31:18.362179 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 18:31:18.369246 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Apr 12 18:31:18.369402 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Apr 12 18:31:18.375555 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:18.379554 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 18:31:18.387556 kernel: hv_netvsc 002248c0-0752-0022-48c0-0752002248c0 eth0: VF slot 1 added Apr 12 18:31:18.397557 kernel: hv_vmbus: registering driver hv_pci Apr 12 18:31:18.411273 kernel: hv_pci f60a401e-d090-4265-be41-72a9e5068279: PCI VMBus probing: Using version 0x10004 Apr 12 18:31:18.411456 kernel: hv_pci f60a401e-d090-4265-be41-72a9e5068279: PCI host bridge to bus d090:00 Apr 12 18:31:18.424156 kernel: pci_bus d090:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Apr 12 18:31:18.424314 kernel: pci_bus d090:00: No busn resource found for root bus, will use [bus 00-ff] Apr 12 18:31:18.441603 kernel: pci d090:00:02.0: [15b3:1018] type 00 class 0x020000 Apr 12 18:31:18.453752 kernel: pci d090:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:31:18.474574 kernel: pci d090:00:02.0: enabling Extended Tags Apr 12 18:31:18.500545 kernel: pci d090:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at d090:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Apr 12 18:31:18.500734 kernel: pci_bus d090:00: busn_res: [bus 00-ff] end is updated to 00 Apr 12 18:31:18.507063 kernel: pci d090:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:31:18.548549 kernel: mlx5_core d090:00:02.0: firmware version: 16.30.1284 Apr 12 18:31:18.705544 kernel: mlx5_core d090:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Apr 12 18:31:18.759541 kernel: hv_netvsc 002248c0-0752-0022-48c0-0752002248c0 eth0: VF registering: eth1 Apr 12 18:31:18.764541 kernel: mlx5_core d090:00:02.0 eth1: joined to eth0 Apr 12 18:31:18.776549 kernel: mlx5_core d090:00:02.0 enP53392s1: renamed from eth1 Apr 12 18:31:18.931994 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:31:19.007556 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (500) Apr 12 18:31:19.020217 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:19.229740 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:31:19.261959 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:31:19.267955 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:31:19.282257 systemd[1]: Starting disk-uuid.service... Apr 12 18:31:20.308491 disk-uuid[555]: The operation has completed successfully. Apr 12 18:31:20.316710 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:31:20.373188 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:31:20.378454 systemd[1]: Finished disk-uuid.service. Apr 12 18:31:20.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.386874 systemd[1]: Starting verity-setup.service... Apr 12 18:31:20.430649 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:31:20.689404 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:31:20.696198 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:31:20.712660 systemd[1]: Finished verity-setup.service. Apr 12 18:31:20.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.768542 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:31:20.768602 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:31:20.772684 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:31:20.773589 systemd[1]: Starting ignition-setup.service... Apr 12 18:31:20.780916 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:31:20.820289 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:20.820351 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:20.824898 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:20.888948 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:31:20.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.897000 audit: BPF prog-id=9 op=LOAD Apr 12 18:31:20.898971 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:20.924829 systemd-networkd[829]: lo: Link UP Apr 12 18:31:20.924841 systemd-networkd[829]: lo: Gained carrier Apr 12 18:31:20.925240 systemd-networkd[829]: Enumeration completed Apr 12 18:31:20.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.926059 systemd-networkd[829]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:20.931662 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:20.938945 systemd[1]: Reached target network.target. Apr 12 18:31:20.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.944278 systemd[1]: Starting iscsiuio.service... Apr 12 18:31:20.964409 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:31:20.984324 iscsid[838]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:20.984324 iscsid[838]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:31:20.984324 iscsid[838]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:31:20.984324 iscsid[838]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:31:20.984324 iscsid[838]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:31:20.984324 iscsid[838]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:20.984324 iscsid[838]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:31:21.142888 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:31:21.142914 kernel: audit: type=1130 audit(1712946680.999:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.142926 kernel: audit: type=1130 audit(1712946681.062:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.142936 kernel: audit: type=1130 audit(1712946681.098:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.964992 systemd[1]: Started iscsiuio.service. Apr 12 18:31:20.972784 systemd[1]: Starting iscsid.service... Apr 12 18:31:20.987873 systemd[1]: Started iscsid.service. Apr 12 18:31:21.163834 kernel: mlx5_core d090:00:02.0 enP53392s1: Link up Apr 12 18:31:21.000645 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:31:21.042059 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:31:21.063390 systemd[1]: Finished ignition-setup.service. Apr 12 18:31:21.098794 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:31:21.226801 kernel: hv_netvsc 002248c0-0752-0022-48c0-0752002248c0 eth0: Data path switched to VF: enP53392s1 Apr 12 18:31:21.226978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:21.226989 kernel: audit: type=1130 audit(1712946681.207:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.122585 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:21.135201 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:21.159624 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:31:21.172318 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:31:21.185615 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:31:21.232676 systemd-networkd[829]: enP53392s1: Link UP Apr 12 18:31:21.232752 systemd-networkd[829]: eth0: Link UP Apr 12 18:31:21.232880 systemd-networkd[829]: eth0: Gained carrier Apr 12 18:31:21.250891 systemd-networkd[829]: enP53392s1: Gained carrier Apr 12 18:31:21.267489 systemd-networkd[829]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:22.722681 systemd-networkd[829]: eth0: Gained IPv6LL Apr 12 18:31:24.730163 ignition[852]: Ignition 2.14.0 Apr 12 18:31:24.730173 ignition[852]: Stage: fetch-offline Apr 12 18:31:24.730234 ignition[852]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:24.730264 ignition[852]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:24.819915 ignition[852]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:24.820072 ignition[852]: parsed url from cmdline: "" Apr 12 18:31:24.820075 ignition[852]: no config URL provided Apr 12 18:31:24.820081 ignition[852]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:31:24.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.827012 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:31:24.820088 ignition[852]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:31:24.879259 kernel: audit: type=1130 audit(1712946684.835:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.837156 systemd[1]: Starting ignition-fetch.service... Apr 12 18:31:24.820094 ignition[852]: failed to fetch config: resource requires networking Apr 12 18:31:24.820333 ignition[852]: Ignition finished successfully Apr 12 18:31:24.866372 ignition[859]: Ignition 2.14.0 Apr 12 18:31:24.866379 ignition[859]: Stage: fetch Apr 12 18:31:24.866493 ignition[859]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:24.866513 ignition[859]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:24.873070 ignition[859]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:24.873471 ignition[859]: parsed url from cmdline: "" Apr 12 18:31:24.873479 ignition[859]: no config URL provided Apr 12 18:31:24.873485 ignition[859]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:31:24.873494 ignition[859]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:31:24.873894 ignition[859]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Apr 12 18:31:24.906994 ignition[859]: GET result: OK Apr 12 18:31:24.907154 ignition[859]: config has been read from IMDS userdata Apr 12 18:31:24.907228 ignition[859]: parsing config with SHA512: aae0bd063b130e9336337ea257526e0d3c3cdb52c1ba4d463e7eb1f63ac725df63e34a0bc3138d8cf4f54c02aad0553d044bf8129f8ae3567fa7922eedb72fcd Apr 12 18:31:24.948524 unknown[859]: fetched base config from "system" Apr 12 18:31:24.948552 unknown[859]: fetched base config from "system" Apr 12 18:31:24.949204 ignition[859]: fetch: fetch complete Apr 12 18:31:24.990234 kernel: audit: type=1130 audit(1712946684.962:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.948558 unknown[859]: fetched user config from "azure" Apr 12 18:31:24.949210 ignition[859]: fetch: fetch passed Apr 12 18:31:24.954031 systemd[1]: Finished ignition-fetch.service. Apr 12 18:31:24.949258 ignition[859]: Ignition finished successfully Apr 12 18:31:24.964093 systemd[1]: Starting ignition-kargs.service... Apr 12 18:31:25.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.999677 ignition[865]: Ignition 2.14.0 Apr 12 18:31:25.012007 systemd[1]: Finished ignition-kargs.service. Apr 12 18:31:25.047893 kernel: audit: type=1130 audit(1712946685.016:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.999684 ignition[865]: Stage: kargs Apr 12 18:31:25.039630 systemd[1]: Starting ignition-disks.service... Apr 12 18:31:24.999808 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:24.999827 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:25.066338 systemd[1]: Finished ignition-disks.service. Apr 12 18:31:25.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.005401 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:25.007284 ignition[865]: kargs: kargs passed Apr 12 18:31:25.095460 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:31:25.119492 kernel: audit: type=1130 audit(1712946685.073:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.007348 ignition[865]: Ignition finished successfully Apr 12 18:31:25.106321 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:25.058723 ignition[871]: Ignition 2.14.0 Apr 12 18:31:25.114451 systemd[1]: Reached target local-fs.target. Apr 12 18:31:25.058730 ignition[871]: Stage: disks Apr 12 18:31:25.124131 systemd[1]: Reached target sysinit.target. Apr 12 18:31:25.058858 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:25.132984 systemd[1]: Reached target basic.target. Apr 12 18:31:25.058880 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:25.145348 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:31:25.061837 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:25.065092 ignition[871]: disks: disks passed Apr 12 18:31:25.065148 ignition[871]: Ignition finished successfully Apr 12 18:31:25.232325 systemd-fsck[879]: ROOT: clean, 612/7326000 files, 481074/7359488 blocks Apr 12 18:31:25.241114 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:31:25.271632 kernel: audit: type=1130 audit(1712946685.245:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.267373 systemd[1]: Mounting sysroot.mount... Apr 12 18:31:25.291481 systemd[1]: Mounted sysroot.mount. Apr 12 18:31:25.299202 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:31:25.295709 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:31:25.398955 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:31:25.403986 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 18:31:25.412004 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:31:25.412041 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:31:25.417944 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:31:25.500207 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:25.505701 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:31:25.536138 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (890) Apr 12 18:31:25.536191 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:25.541129 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:25.545739 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:25.546851 initrd-setup-root[895]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:31:25.557071 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:25.586921 initrd-setup-root[921]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:31:25.619858 initrd-setup-root[929]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:31:25.629037 initrd-setup-root[937]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:31:26.252238 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:31:26.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.258027 systemd[1]: Starting ignition-mount.service... Apr 12 18:31:26.287492 kernel: audit: type=1130 audit(1712946686.256:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.282697 systemd[1]: Starting sysroot-boot.service... Apr 12 18:31:26.295751 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:26.295911 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:26.321323 systemd[1]: Finished sysroot-boot.service. Apr 12 18:31:26.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.347549 kernel: audit: type=1130 audit(1712946686.325:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.468833 ignition[960]: INFO : Ignition 2.14.0 Apr 12 18:31:26.468833 ignition[960]: INFO : Stage: mount Apr 12 18:31:26.481625 ignition[960]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:26.481625 ignition[960]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:26.481625 ignition[960]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:26.481625 ignition[960]: INFO : mount: mount passed Apr 12 18:31:26.481625 ignition[960]: INFO : Ignition finished successfully Apr 12 18:31:26.540614 kernel: audit: type=1130 audit(1712946686.483:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:26.479347 systemd[1]: Finished ignition-mount.service. Apr 12 18:31:27.129189 coreos-metadata[889]: Apr 12 18:31:27.129 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:31:27.138896 coreos-metadata[889]: Apr 12 18:31:27.137 INFO Fetch successful Apr 12 18:31:27.171590 coreos-metadata[889]: Apr 12 18:31:27.171 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:31:27.186999 coreos-metadata[889]: Apr 12 18:31:27.186 INFO Fetch successful Apr 12 18:31:27.205290 coreos-metadata[889]: Apr 12 18:31:27.205 INFO wrote hostname ci-3510.3.3-a-7076f33771 to /sysroot/etc/hostname Apr 12 18:31:27.214666 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 18:31:27.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.221014 systemd[1]: Starting ignition-files.service... Apr 12 18:31:27.248378 kernel: audit: type=1130 audit(1712946687.219:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:27.247548 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:27.266555 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (969) Apr 12 18:31:27.278039 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:27.278074 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:27.278085 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:27.289382 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:27.304596 ignition[988]: INFO : Ignition 2.14.0 Apr 12 18:31:27.304596 ignition[988]: INFO : Stage: files Apr 12 18:31:27.316153 ignition[988]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:27.316153 ignition[988]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:27.316153 ignition[988]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:27.316153 ignition[988]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:31:27.350845 ignition[988]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:31:27.350845 ignition[988]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:31:27.414084 ignition[988]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:31:27.422107 ignition[988]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:31:27.438438 unknown[988]: wrote ssh authorized keys file for user: core Apr 12 18:31:27.444039 ignition[988]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:31:27.444039 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:27.444039 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:27.933139 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:31:28.087222 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:31:28.103906 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:28.103906 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:28.103906 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:28.257210 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:31:28.481226 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:28.493416 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:28.493416 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:31:28.883701 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:31:29.136411 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:31:29.152580 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:29.152580 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:29.152580 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:31:29.381920 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:31:29.667939 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Apr 12 18:31:29.685276 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:29.685276 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:29.685276 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:31:29.738024 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:31:30.015604 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Apr 12 18:31:30.032182 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:30.032182 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:30.032182 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:31:30.083579 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:31:30.694543 ignition[988]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:30.711180 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:30.922612 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (993) Apr 12 18:31:30.922648 kernel: audit: type=1130 audit(1712946690.805:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1726992486" Apr 12 18:31:30.922706 ignition[988]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1726992486": device or resource busy Apr 12 18:31:30.922706 ignition[988]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1726992486", trying btrfs: device or resource busy Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1726992486" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1726992486" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1726992486" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1726992486" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2945480111" Apr 12 18:31:30.922706 ignition[988]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2945480111": device or resource busy Apr 12 18:31:30.922706 ignition[988]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2945480111", trying btrfs: device or resource busy Apr 12 18:31:30.922706 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2945480111" Apr 12 18:31:30.748950 systemd[1]: mnt-oem1726992486.mount: Deactivated successfully. Apr 12 18:31:31.088956 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2945480111" Apr 12 18:31:31.088956 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2945480111" Apr 12 18:31:31.088956 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2945480111" Apr 12 18:31:31.088956 ignition[988]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(17): [started] processing unit "waagent.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(17): [finished] processing unit "waagent.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(18): [started] processing unit "nvidia.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(18): [finished] processing unit "nvidia.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:31.088956 ignition[988]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:31.300719 kernel: audit: type=1130 audit(1712946691.143:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.300754 kernel: audit: type=1131 audit(1712946691.165:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.780711 systemd[1]: Finished ignition-files.service. Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:31.305055 ignition[988]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:31.305055 ignition[988]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:31.305055 ignition[988]: INFO : files: files passed Apr 12 18:31:31.305055 ignition[988]: INFO : Ignition finished successfully Apr 12 18:31:30.815958 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:31:30.855653 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:31:30.856565 systemd[1]: Starting ignition-quench.service... Apr 12 18:31:31.132809 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:31:31.132919 systemd[1]: Finished ignition-quench.service. Apr 12 18:31:31.496444 initrd-setup-root-after-ignition[1014]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:31:31.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.505790 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:31:31.540922 kernel: audit: type=1130 audit(1712946691.511:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.511844 systemd[1]: Reached target ignition-complete.target. Apr 12 18:31:31.540769 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:31:31.563025 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:31:31.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.563142 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:31:31.616426 kernel: audit: type=1130 audit(1712946691.567:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.616453 kernel: audit: type=1131 audit(1712946691.567:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.568022 systemd[1]: Reached target initrd-fs.target. Apr 12 18:31:31.612483 systemd[1]: Reached target initrd.target. Apr 12 18:31:31.620691 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:31:31.621647 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:31:31.647240 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:31:31.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.652700 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:31:31.682546 kernel: audit: type=1130 audit(1712946691.651:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.686111 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:31:31.694556 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:31:31.699341 systemd[1]: Stopped target timers.target. Apr 12 18:31:31.703688 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:31:31.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.703766 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:31:31.716122 systemd[1]: Stopped target initrd.target. Apr 12 18:31:31.754219 kernel: audit: type=1131 audit(1712946691.715:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.742471 systemd[1]: Stopped target basic.target. Apr 12 18:31:31.750591 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:31:31.759062 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:31:31.768219 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:31:31.777774 systemd[1]: Stopped target remote-fs.target. Apr 12 18:31:31.786556 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:31:31.795489 systemd[1]: Stopped target sysinit.target. Apr 12 18:31:31.803519 systemd[1]: Stopped target local-fs.target. Apr 12 18:31:31.811949 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:31:31.819923 systemd[1]: Stopped target swap.target. Apr 12 18:31:31.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.827688 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:31:31.868628 kernel: audit: type=1131 audit(1712946691.835:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.827755 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:31:31.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.836118 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:31:31.903270 kernel: audit: type=1131 audit(1712946691.872:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.863478 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:31:31.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.863540 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:31:31.976776 kernel: audit: type=1131 audit(1712946691.898:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.976804 kernel: audit: type=1131 audit(1712946691.926:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.976814 kernel: audit: type=1131 audit(1712946691.951:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.873145 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:31:31.987603 ignition[1027]: INFO : Ignition 2.14.0 Apr 12 18:31:31.987603 ignition[1027]: INFO : Stage: umount Apr 12 18:31:31.987603 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:31.987603 ignition[1027]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:31.987603 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:32.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.030800 iscsid[838]: iscsid shutting down. Apr 12 18:31:31.873185 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:31:32.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.050270 ignition[1027]: INFO : umount: umount passed Apr 12 18:31:32.050270 ignition[1027]: INFO : Ignition finished successfully Apr 12 18:31:32.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.899159 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:31:32.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.899205 systemd[1]: Stopped ignition-files.service. Apr 12 18:31:32.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.927327 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 18:31:32.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.927373 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 18:31:32.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.952577 systemd[1]: Stopping ignition-mount.service... Apr 12 18:31:32.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.982059 systemd[1]: Stopping iscsid.service... Apr 12 18:31:32.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.999033 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:31:31.999113 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:31:32.023245 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:31:32.036566 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:31:32.036653 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:31:32.044949 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:31:32.044994 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:31:32.055129 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:31:32.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.055325 systemd[1]: Stopped iscsid.service. Apr 12 18:31:32.067840 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:31:32.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.067946 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:31:32.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.077243 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:31:32.077344 systemd[1]: Stopped ignition-mount.service. Apr 12 18:31:32.087115 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:31:32.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.087469 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:31:32.087513 systemd[1]: Stopped ignition-disks.service. Apr 12 18:31:32.096314 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:31:32.096367 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:31:32.105316 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:31:32.263000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:31:32.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.105358 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:31:32.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.114518 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:31:32.114638 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:31:32.119818 systemd[1]: Stopped target paths.target. Apr 12 18:31:32.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.127284 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:31:32.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.137553 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:31:32.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.146460 systemd[1]: Stopped target slices.target. Apr 12 18:31:32.155808 systemd[1]: Stopped target sockets.target. Apr 12 18:31:32.164153 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:31:32.164204 systemd[1]: Closed iscsid.socket. Apr 12 18:31:32.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.172726 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:31:32.172767 systemd[1]: Stopped ignition-setup.service. Apr 12 18:31:32.181831 systemd[1]: Stopping iscsiuio.service... Apr 12 18:31:32.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.190874 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:31:32.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.190981 systemd[1]: Stopped iscsiuio.service. Apr 12 18:31:32.402524 kernel: hv_netvsc 002248c0-0752-0022-48c0-0752002248c0 eth0: Data path switched from VF: enP53392s1 Apr 12 18:31:32.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.197961 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:31:32.198048 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:31:32.206952 systemd[1]: Stopped target network.target. Apr 12 18:31:32.214730 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:31:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.214764 systemd[1]: Closed iscsiuio.socket. Apr 12 18:31:32.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.223320 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:31:32.223369 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:31:32.231785 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:31:32.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:32.240588 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:31:32.253138 systemd-networkd[829]: eth0: DHCPv6 lease lost Apr 12 18:31:32.462000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:31:32.259665 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:31:32.259786 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:31:32.268560 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:31:32.268664 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:31:32.278279 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:31:32.278314 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:31:32.287163 systemd[1]: Stopping network-cleanup.service... Apr 12 18:31:32.295483 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:31:32.518885 systemd-journald[236]: Received SIGTERM from PID 1 (n/a). Apr 12 18:31:32.295568 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:31:32.304801 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:31:32.304858 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:31:32.317901 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:31:32.317952 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:31:32.322686 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:31:32.331648 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:31:32.338951 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:31:32.339094 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:31:32.348074 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:31:32.348121 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:31:32.355400 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:31:32.355435 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:31:32.364831 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:31:32.364879 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:31:32.372985 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:31:32.373021 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:31:32.380938 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:31:32.380978 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:31:32.402022 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:31:32.415823 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:31:32.415901 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:31:32.424818 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:31:32.424927 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:31:32.442232 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:31:32.442335 systemd[1]: Stopped network-cleanup.service. Apr 12 18:31:32.450205 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:31:32.459599 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:31:32.476007 systemd[1]: Switching root. Apr 12 18:31:32.519654 systemd-journald[236]: Journal stopped Apr 12 18:31:47.195807 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:31:47.195829 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:31:47.195840 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:31:47.195853 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:31:47.195861 kernel: SELinux: policy capability open_perms=1 Apr 12 18:31:47.195869 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:31:47.195878 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:31:47.195886 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:31:47.195894 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:31:47.195903 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:31:47.195912 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:31:47.195922 systemd[1]: Successfully loaded SELinux policy in 343.732ms. Apr 12 18:31:47.195932 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 90.246ms. Apr 12 18:31:47.195942 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:47.195954 systemd[1]: Detected virtualization microsoft. Apr 12 18:31:47.195962 systemd[1]: Detected architecture arm64. Apr 12 18:31:47.195971 systemd[1]: Detected first boot. Apr 12 18:31:47.195980 systemd[1]: Hostname set to . Apr 12 18:31:47.195989 systemd[1]: Initializing machine ID from random generator. Apr 12 18:31:47.195998 kernel: kauditd_printk_skb: 31 callbacks suppressed Apr 12 18:31:47.196007 kernel: audit: type=1400 audit(1712946696.630:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:47.196016 kernel: audit: type=1400 audit(1712946696.637:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:47.196026 kernel: audit: type=1334 audit(1712946696.654:84): prog-id=10 op=LOAD Apr 12 18:31:47.196035 kernel: audit: type=1334 audit(1712946696.654:85): prog-id=10 op=UNLOAD Apr 12 18:31:47.196044 kernel: audit: type=1334 audit(1712946696.671:86): prog-id=11 op=LOAD Apr 12 18:31:47.196053 kernel: audit: type=1334 audit(1712946696.671:87): prog-id=11 op=UNLOAD Apr 12 18:31:47.196062 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:31:47.196071 kernel: audit: type=1400 audit(1712946698.207:88): avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:47.196082 kernel: audit: type=1300 audit(1712946698.207:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:47.196092 kernel: audit: type=1327 audit(1712946698.207:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:47.196102 kernel: audit: type=1400 audit(1712946698.221:89): avc: denied { associate } for pid=1060 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:47.196111 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:31:47.196120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:47.196130 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:47.196140 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:47.196150 kernel: kauditd_printk_skb: 5 callbacks suppressed Apr 12 18:31:47.196159 kernel: audit: type=1334 audit(1712946706.411:90): prog-id=12 op=LOAD Apr 12 18:31:47.196167 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:31:47.196176 kernel: audit: type=1334 audit(1712946706.411:91): prog-id=3 op=UNLOAD Apr 12 18:31:47.196185 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:31:47.196196 kernel: audit: type=1334 audit(1712946706.411:92): prog-id=13 op=LOAD Apr 12 18:31:47.196205 kernel: audit: type=1334 audit(1712946706.411:93): prog-id=14 op=LOAD Apr 12 18:31:47.196215 kernel: audit: type=1334 audit(1712946706.411:94): prog-id=4 op=UNLOAD Apr 12 18:31:47.196224 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:31:47.196233 kernel: audit: type=1334 audit(1712946706.411:95): prog-id=5 op=UNLOAD Apr 12 18:31:47.196243 kernel: audit: type=1334 audit(1712946706.412:96): prog-id=15 op=LOAD Apr 12 18:31:47.196252 kernel: audit: type=1334 audit(1712946706.412:97): prog-id=12 op=UNLOAD Apr 12 18:31:47.196261 kernel: audit: type=1334 audit(1712946706.412:98): prog-id=16 op=LOAD Apr 12 18:31:47.196270 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:31:47.196279 kernel: audit: type=1334 audit(1712946706.412:99): prog-id=17 op=LOAD Apr 12 18:31:47.196289 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:31:47.196299 systemd[1]: Created slice system-getty.slice. Apr 12 18:31:47.196309 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:31:47.196318 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:31:47.196328 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:31:47.196337 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:31:47.196347 systemd[1]: Created slice user.slice. Apr 12 18:31:47.196356 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:47.196365 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:31:47.196375 systemd[1]: Set up automount boot.automount. Apr 12 18:31:47.196385 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:31:47.196394 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:31:47.196403 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:31:47.196413 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:31:47.196422 systemd[1]: Reached target integritysetup.target. Apr 12 18:31:47.196431 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:47.196442 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:47.196452 systemd[1]: Reached target slices.target. Apr 12 18:31:47.196462 systemd[1]: Reached target swap.target. Apr 12 18:31:47.196471 systemd[1]: Reached target torcx.target. Apr 12 18:31:47.196480 systemd[1]: Reached target veritysetup.target. Apr 12 18:31:47.196490 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:31:47.196499 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:31:47.196508 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:47.196519 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:47.196536 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:47.196546 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:31:47.196555 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:31:47.196565 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:31:47.196574 systemd[1]: Mounting media.mount... Apr 12 18:31:47.196583 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:31:47.196594 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:31:47.196603 systemd[1]: Mounting tmp.mount... Apr 12 18:31:47.196612 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:31:47.196622 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:31:47.196631 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:47.196640 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:31:47.196651 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:31:47.196660 systemd[1]: Starting modprobe@drm.service... Apr 12 18:31:47.196669 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:31:47.196680 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:31:47.196689 systemd[1]: Starting modprobe@loop.service... Apr 12 18:31:47.196700 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:31:47.196709 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:31:47.196718 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:31:47.196728 kernel: fuse: init (API version 7.34) Apr 12 18:31:47.196736 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:31:47.196746 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:31:47.196756 kernel: loop: module loaded Apr 12 18:31:47.196766 systemd[1]: Stopped systemd-journald.service. Apr 12 18:31:47.196776 systemd[1]: systemd-journald.service: Consumed 3.338s CPU time. Apr 12 18:31:47.196785 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:47.196794 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:47.196804 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:31:47.196813 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:31:47.196822 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:47.196831 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:31:47.196841 systemd[1]: Stopped verity-setup.service. Apr 12 18:31:47.196853 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:31:47.196862 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:31:47.196871 systemd[1]: Mounted media.mount. Apr 12 18:31:47.196881 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:31:47.196895 systemd-journald[1166]: Journal started Apr 12 18:31:47.196936 systemd-journald[1166]: Runtime Journal (/run/log/journal/3643e1e9499447ebb1e43b7d1cdcf6e2) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:31:35.657000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:31:36.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:36.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:36.654000 audit: BPF prog-id=10 op=LOAD Apr 12 18:31:36.654000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:31:36.671000 audit: BPF prog-id=11 op=LOAD Apr 12 18:31:36.671000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:31:38.207000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:38.207000 audit[1060]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.207000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:38.221000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:38.221000 audit[1060]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022109 a2=1ed a3=0 items=2 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.221000 audit: CWD cwd="/" Apr 12 18:31:38.221000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:38.221000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:38.221000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:46.411000 audit: BPF prog-id=12 op=LOAD Apr 12 18:31:46.411000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:31:46.411000 audit: BPF prog-id=13 op=LOAD Apr 12 18:31:46.411000 audit: BPF prog-id=14 op=LOAD Apr 12 18:31:46.411000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:31:46.411000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:31:46.412000 audit: BPF prog-id=15 op=LOAD Apr 12 18:31:46.412000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:31:46.412000 audit: BPF prog-id=16 op=LOAD Apr 12 18:31:46.412000 audit: BPF prog-id=17 op=LOAD Apr 12 18:31:46.412000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:31:46.412000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:31:46.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:46.446000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:31:46.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:46.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.081000 audit: BPF prog-id=18 op=LOAD Apr 12 18:31:47.081000 audit: BPF prog-id=19 op=LOAD Apr 12 18:31:47.081000 audit: BPF prog-id=20 op=LOAD Apr 12 18:31:47.081000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:31:47.081000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:31:47.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.193000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:31:47.193000 audit[1166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffcf45c6e0 a2=4000 a3=1 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:47.193000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:31:46.410267 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:31:38.135004 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:46.413319 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:31:38.153163 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:46.415809 systemd[1]: systemd-journald.service: Consumed 3.338s CPU time. Apr 12 18:31:38.153182 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:38.153222 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:31:38.153232 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:31:38.153265 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:31:38.153277 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:31:38.153480 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:31:38.153513 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:38.153544 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:38.189636 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:31:38.189705 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:31:38.189740 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:31:38.189766 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:31:38.189801 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:31:38.189826 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:31:44.871838 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:44.872113 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:44.872207 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:44.872364 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:44.872413 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:31:44.872469 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2024-04-12T18:31:44Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:31:47.213913 systemd[1]: Started systemd-journald.service. Apr 12 18:31:47.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.214778 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:31:47.222320 systemd[1]: Mounted tmp.mount. Apr 12 18:31:47.226313 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:31:47.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.231802 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:47.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.236784 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:31:47.236923 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:31:47.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.242010 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:31:47.242139 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:31:47.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.247017 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:31:47.247142 systemd[1]: Finished modprobe@drm.service. Apr 12 18:31:47.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.251897 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:31:47.252025 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:31:47.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.257463 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:31:47.257615 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:31:47.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.262692 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:31:47.262823 systemd[1]: Finished modprobe@loop.service. Apr 12 18:31:47.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.268414 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:31:47.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.274686 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:31:47.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.280357 systemd[1]: Reached target network-pre.target. Apr 12 18:31:47.286886 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:31:47.292717 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:31:47.297793 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:31:47.317741 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:31:47.323373 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:31:47.327785 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:31:47.329112 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:31:47.333518 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:31:47.334927 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:31:47.340919 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:47.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.346041 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:31:47.351138 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:47.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.356867 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:31:47.363086 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:47.368174 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:31:47.380289 udevadm[1180]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:31:47.393913 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:31:47.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.398938 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:31:47.415468 systemd-journald[1166]: Time spent on flushing to /var/log/journal/3643e1e9499447ebb1e43b7d1cdcf6e2 is 16.937ms for 1139 entries. Apr 12 18:31:47.415468 systemd-journald[1166]: System Journal (/var/log/journal/3643e1e9499447ebb1e43b7d1cdcf6e2) is 8.0M, max 2.6G, 2.6G free. Apr 12 18:31:47.512380 systemd-journald[1166]: Received client request to flush runtime journal. Apr 12 18:31:47.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:47.492902 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:47.513426 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:31:47.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:48.028541 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:31:48.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:48.744292 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:31:48.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:48.749000 audit: BPF prog-id=21 op=LOAD Apr 12 18:31:48.749000 audit: BPF prog-id=22 op=LOAD Apr 12 18:31:48.749000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:31:48.749000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:31:48.750741 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:48.769466 systemd-udevd[1183]: Using default interface naming scheme 'v252'. Apr 12 18:31:49.148901 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:49.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:49.158000 audit: BPF prog-id=23 op=LOAD Apr 12 18:31:49.161201 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:49.191320 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:31:49.271579 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:31:49.287096 kernel: hv_utils: Registering HyperV Utility Driver Apr 12 18:31:49.287226 kernel: hv_vmbus: registering driver hv_utils Apr 12 18:31:49.283000 audit[1188]: AVC avc: denied { confidentiality } for pid=1188 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:31:49.294563 kernel: hv_vmbus: registering driver hv_balloon Apr 12 18:31:49.295545 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Apr 12 18:31:49.304212 kernel: hv_balloon: Memory hot add disabled on ARM64 Apr 12 18:31:49.304382 kernel: hv_utils: Heartbeat IC version 3.0 Apr 12 18:31:49.311968 kernel: hv_utils: Shutdown IC version 3.2 Apr 12 18:31:49.312087 kernel: hv_utils: TimeSync IC version 4.0 Apr 12 18:31:49.283000 audit[1188]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac8a693c0 a1=aa2c a2=ffffa68824b0 a3=aaaac899d010 items=12 ppid=1183 pid=1188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:49.283000 audit: CWD cwd="/" Apr 12 18:31:49.283000 audit: PATH item=0 name=(null) inode=5947 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=1 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=2 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=3 name=(null) inode=10214 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=4 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=5 name=(null) inode=10215 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=6 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=7 name=(null) inode=10216 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=8 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=9 name=(null) inode=10217 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=10 name=(null) inode=10213 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PATH item=11 name=(null) inode=10218 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:49.283000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:31:49.555330 kernel: hv_vmbus: registering driver hyperv_fb Apr 12 18:31:49.555438 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Apr 12 18:31:49.562932 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Apr 12 18:31:49.568508 kernel: Console: switching to colour dummy device 80x25 Apr 12 18:31:49.571366 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:31:49.645000 audit: BPF prog-id=24 op=LOAD Apr 12 18:31:49.645000 audit: BPF prog-id=25 op=LOAD Apr 12 18:31:49.645000 audit: BPF prog-id=26 op=LOAD Apr 12 18:31:49.647959 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:31:49.738876 systemd[1]: Started systemd-userdbd.service. Apr 12 18:31:49.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:49.797334 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1204) Apr 12 18:31:49.827700 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:49.836796 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:31:49.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:49.843072 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:31:50.137658 systemd-networkd[1202]: lo: Link UP Apr 12 18:31:50.137949 systemd-networkd[1202]: lo: Gained carrier Apr 12 18:31:50.138471 systemd-networkd[1202]: Enumeration completed Apr 12 18:31:50.138666 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:50.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.144751 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:31:50.181333 systemd-networkd[1202]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:50.228315 kernel: mlx5_core d090:00:02.0 enP53392s1: Link up Apr 12 18:31:50.256321 kernel: hv_netvsc 002248c0-0752-0022-48c0-0752002248c0 eth0: Data path switched to VF: enP53392s1 Apr 12 18:31:50.257084 systemd-networkd[1202]: enP53392s1: Link UP Apr 12 18:31:50.257279 systemd-networkd[1202]: eth0: Link UP Apr 12 18:31:50.257379 systemd-networkd[1202]: eth0: Gained carrier Apr 12 18:31:50.266585 systemd-networkd[1202]: enP53392s1: Gained carrier Apr 12 18:31:50.276482 systemd-networkd[1202]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:50.321328 lvm[1260]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:50.365182 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:31:50.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.370335 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:50.375802 systemd[1]: Starting lvm2-activation.service... Apr 12 18:31:50.380066 lvm[1263]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:50.400285 systemd[1]: Finished lvm2-activation.service. Apr 12 18:31:50.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.404852 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:50.409597 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:31:50.409625 systemd[1]: Reached target local-fs.target. Apr 12 18:31:50.413815 systemd[1]: Reached target machines.target. Apr 12 18:31:50.419291 systemd[1]: Starting ldconfig.service... Apr 12 18:31:50.439338 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:31:50.439412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:50.440648 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:31:50.445880 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:31:50.452412 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:31:50.457159 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:50.457233 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:50.458764 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:31:50.503950 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1265 (bootctl) Apr 12 18:31:50.505289 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:31:50.588398 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:31:50.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.833814 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:31:51.233027 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:31:51.233643 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:31:51.239225 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) Apr 12 18:31:51.239225 systemd-fsck[1273]: /dev/sda1: 236 files, 117047/258078 clusters Apr 12 18:31:51.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:51.240655 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:31:51.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:51.250099 systemd[1]: Mounting boot.mount... Apr 12 18:31:51.258666 systemd[1]: Mounted boot.mount. Apr 12 18:31:51.269867 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:31:51.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:51.821369 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:31:51.923460 systemd-networkd[1202]: eth0: Gained IPv6LL Apr 12 18:31:51.926225 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:31:51.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:51.935709 kernel: kauditd_printk_skb: 77 callbacks suppressed Apr 12 18:31:51.935779 kernel: audit: type=1130 audit(1712946711.930:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:51.937159 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:31:52.512601 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:31:52.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.519029 systemd[1]: Starting audit-rules.service... Apr 12 18:31:52.534316 kernel: audit: type=1130 audit(1712946712.516:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.539570 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:31:52.545409 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:31:52.550000 audit: BPF prog-id=27 op=LOAD Apr 12 18:31:52.552567 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:52.561144 kernel: audit: type=1334 audit(1712946712.550:162): prog-id=27 op=LOAD Apr 12 18:31:52.560000 audit: BPF prog-id=28 op=LOAD Apr 12 18:31:52.564880 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:31:52.571725 kernel: audit: type=1334 audit(1712946712.560:163): prog-id=28 op=LOAD Apr 12 18:31:52.573402 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:31:52.621978 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:31:52.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.627018 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:31:52.649325 kernel: audit: type=1130 audit(1712946712.625:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.649433 kernel: audit: type=1127 audit(1712946712.646:165): pid=1285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.646000 audit[1285]: SYSTEM_BOOT pid=1285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.667203 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:31:52.672781 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:31:52.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.695772 systemd[1]: Reached target time-set.target. Apr 12 18:31:52.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.716142 kernel: audit: type=1130 audit(1712946712.670:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.716237 kernel: audit: type=1130 audit(1712946712.694:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.724154 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:31:52.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.749330 kernel: audit: type=1130 audit(1712946712.729:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.818164 systemd-resolved[1283]: Positive Trust Anchors: Apr 12 18:31:52.818545 systemd-resolved[1283]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:52.818631 systemd-resolved[1283]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:52.822104 systemd-resolved[1283]: Using system hostname 'ci-3510.3.3-a-7076f33771'. Apr 12 18:31:52.823656 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:52.828335 systemd[1]: Reached target network.target. Apr 12 18:31:52.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.851268 systemd[1]: Reached target network-online.target. Apr 12 18:31:52.851420 kernel: audit: type=1130 audit(1712946712.826:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:52.856485 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:53.057019 systemd-timesyncd[1284]: Contacted time server 5.161.111.190:123 (0.flatcar.pool.ntp.org). Apr 12 18:31:53.057090 systemd-timesyncd[1284]: Initial clock synchronization to Fri 2024-04-12 18:31:53.062315 UTC. Apr 12 18:31:53.127000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:31:53.127000 audit[1300]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffce5f2ce0 a2=420 a3=0 items=0 ppid=1279 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:53.127000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:31:53.128909 augenrules[1300]: No rules Apr 12 18:31:53.129901 systemd[1]: Finished audit-rules.service. Apr 12 18:32:00.834934 ldconfig[1264]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:32:00.846329 systemd[1]: Finished ldconfig.service. Apr 12 18:32:00.852619 systemd[1]: Starting systemd-update-done.service... Apr 12 18:32:00.907955 systemd[1]: Finished systemd-update-done.service. Apr 12 18:32:00.912985 systemd[1]: Reached target sysinit.target. Apr 12 18:32:00.917494 systemd[1]: Started motdgen.path. Apr 12 18:32:00.921847 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:32:00.928279 systemd[1]: Started logrotate.timer. Apr 12 18:32:00.932768 systemd[1]: Started mdadm.timer. Apr 12 18:32:00.936357 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:32:00.941023 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:32:00.941054 systemd[1]: Reached target paths.target. Apr 12 18:32:00.945093 systemd[1]: Reached target timers.target. Apr 12 18:32:00.950273 systemd[1]: Listening on dbus.socket. Apr 12 18:32:00.955822 systemd[1]: Starting docker.socket... Apr 12 18:32:00.977106 systemd[1]: Listening on sshd.socket. Apr 12 18:32:00.981499 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:32:00.982033 systemd[1]: Listening on docker.socket. Apr 12 18:32:00.986284 systemd[1]: Reached target sockets.target. Apr 12 18:32:00.990608 systemd[1]: Reached target basic.target. Apr 12 18:32:00.995178 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:32:00.995210 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:32:00.996449 systemd[1]: Starting containerd.service... Apr 12 18:32:01.001419 systemd[1]: Starting dbus.service... Apr 12 18:32:01.005884 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:32:01.012031 systemd[1]: Starting extend-filesystems.service... Apr 12 18:32:01.016867 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:32:01.021355 systemd[1]: Starting motdgen.service... Apr 12 18:32:01.027110 systemd[1]: Started nvidia.service. Apr 12 18:32:01.033038 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:32:01.038804 systemd[1]: Starting prepare-critools.service... Apr 12 18:32:01.044668 systemd[1]: Starting prepare-helm.service... Apr 12 18:32:01.049857 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:32:01.055980 systemd[1]: Starting sshd-keygen.service... Apr 12 18:32:01.063049 systemd[1]: Starting systemd-logind.service... Apr 12 18:32:01.067950 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:32:01.068017 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:32:01.068738 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:32:01.071505 systemd[1]: Starting update-engine.service... Apr 12 18:32:01.077937 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:32:01.090207 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:32:01.090411 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:32:01.137559 jq[1310]: false Apr 12 18:32:01.137845 jq[1329]: true Apr 12 18:32:01.158913 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:32:01.159098 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:32:01.170907 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:32:01.171113 systemd[1]: Finished motdgen.service. Apr 12 18:32:01.194170 systemd-logind[1325]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:32:01.195492 systemd-logind[1325]: New seat seat0. Apr 12 18:32:01.197817 jq[1335]: true Apr 12 18:32:01.234134 env[1336]: time="2024-04-12T18:32:01.234068558Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:32:01.248038 extend-filesystems[1311]: Found sda Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda1 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda2 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda3 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found usr Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda4 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda6 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda7 Apr 12 18:32:01.252516 extend-filesystems[1311]: Found sda9 Apr 12 18:32:01.252516 extend-filesystems[1311]: Checking size of /dev/sda9 Apr 12 18:32:01.334908 tar[1331]: ./ Apr 12 18:32:01.334908 tar[1331]: ./loopback Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.293640553Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.293802148Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306229306Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306270514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306665280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306685444Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306699047Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.306708849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.307989805Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.343703 env[1336]: time="2024-04-12T18:32:01.308241339Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:32:01.360677 tar[1333]: linux-arm64/helm Apr 12 18:32:01.360918 tar[1332]: crictl Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.308462187Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.308481671Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.308602257Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.308620301Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344186724Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344262780Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344277623Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344329034Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344348198Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344363482Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344376084Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344830702Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361232 env[1336]: time="2024-04-12T18:32:01.344852467Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.350247 systemd[1]: Started containerd.service. Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.344865870Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.344878953Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.344893716Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345050990Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345154252Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345430352Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345466999Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345483443Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345542576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345556419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345568141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345579224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345643518Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361579 env[1336]: time="2024-04-12T18:32:01.345658201Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345677765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345691208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345704691Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345860804Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345878928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345891811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345913976Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345930179Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345941902Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.345959986Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:32:01.361830 env[1336]: time="2024-04-12T18:32:01.346006116Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:32:01.362708 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:32:01.369011 bash[1372]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.346228083Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.346283135Z" level=info msg="Connect containerd service" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.346335627Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349356598Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349486666Z" level=info msg="Start subscribing containerd event" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349529235Z" level=info msg="Start recovering state" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349599690Z" level=info msg="Start event monitor" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349618174Z" level=info msg="Start snapshots syncer" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349627376Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.349635218Z" level=info msg="Start streaming server" Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.350012619Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.350065190Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:32:01.369090 env[1336]: time="2024-04-12T18:32:01.357361442Z" level=info msg="containerd successfully booted in 0.124184s" Apr 12 18:32:01.385252 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:32:01.407780 tar[1331]: ./bandwidth Apr 12 18:32:01.407831 extend-filesystems[1311]: Old size kept for /dev/sda9 Apr 12 18:32:01.407831 extend-filesystems[1311]: Found sr0 Apr 12 18:32:01.397407 dbus-daemon[1309]: [system] SELinux support is enabled Apr 12 18:32:01.385479 systemd[1]: Finished extend-filesystems.service. Apr 12 18:32:01.419918 dbus-daemon[1309]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:32:01.397555 systemd[1]: Started dbus.service. Apr 12 18:32:01.402876 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:32:01.402901 systemd[1]: Reached target system-config.target. Apr 12 18:32:01.412351 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:32:01.412371 systemd[1]: Reached target user-config.target. Apr 12 18:32:01.420073 systemd[1]: Started systemd-logind.service. Apr 12 18:32:01.527594 tar[1331]: ./ptp Apr 12 18:32:01.639454 tar[1331]: ./vlan Apr 12 18:32:01.715828 tar[1331]: ./host-device Apr 12 18:32:01.754922 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:32:01.778116 tar[1331]: ./tuning Apr 12 18:32:01.831777 tar[1331]: ./vrf Apr 12 18:32:01.884332 tar[1331]: ./sbr Apr 12 18:32:01.938764 tar[1331]: ./tap Apr 12 18:32:01.992767 update_engine[1327]: I0412 18:32:01.968430 1327 main.cc:92] Flatcar Update Engine starting Apr 12 18:32:02.000954 tar[1331]: ./dhcp Apr 12 18:32:02.058438 systemd[1]: Started update-engine.service. Apr 12 18:32:02.070462 update_engine[1327]: I0412 18:32:02.058477 1327 update_check_scheduler.cc:74] Next update check in 3m21s Apr 12 18:32:02.065847 systemd[1]: Started locksmithd.service. Apr 12 18:32:02.143252 tar[1333]: linux-arm64/LICENSE Apr 12 18:32:02.143388 tar[1333]: linux-arm64/README.md Apr 12 18:32:02.150672 systemd[1]: Finished prepare-helm.service. Apr 12 18:32:02.165735 tar[1331]: ./static Apr 12 18:32:02.208639 tar[1331]: ./firewall Apr 12 18:32:02.273901 tar[1331]: ./macvlan Apr 12 18:32:02.288504 systemd[1]: Finished prepare-critools.service. Apr 12 18:32:02.315827 tar[1331]: ./dummy Apr 12 18:32:02.348747 tar[1331]: ./bridge Apr 12 18:32:02.385148 tar[1331]: ./ipvlan Apr 12 18:32:02.418102 tar[1331]: ./portmap Apr 12 18:32:02.450003 tar[1331]: ./host-local Apr 12 18:32:02.539590 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:32:02.819366 sshd_keygen[1328]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:32:02.837085 systemd[1]: Finished sshd-keygen.service. Apr 12 18:32:02.843044 systemd[1]: Starting issuegen.service... Apr 12 18:32:02.847825 systemd[1]: Started waagent.service. Apr 12 18:32:02.852528 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:32:02.852695 systemd[1]: Finished issuegen.service. Apr 12 18:32:02.858264 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:32:02.901625 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:32:02.908663 systemd[1]: Started getty@tty1.service. Apr 12 18:32:02.914791 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:32:02.919985 systemd[1]: Reached target getty.target. Apr 12 18:32:02.924443 systemd[1]: Reached target multi-user.target. Apr 12 18:32:02.930705 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:32:02.939457 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:32:02.939627 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:32:02.946538 systemd[1]: Startup finished in 733ms (kernel) + 18.400s (initrd) + 27.696s (userspace) = 46.830s. Apr 12 18:32:03.801624 login[1432]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 18:32:03.818530 login[1431]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:32:03.860816 systemd[1]: Created slice user-500.slice. Apr 12 18:32:03.861990 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:32:03.864355 systemd-logind[1325]: New session 2 of user core. Apr 12 18:32:03.905494 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:32:03.907032 systemd[1]: Starting user@500.service... Apr 12 18:32:03.981288 (systemd)[1438]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:04.375620 systemd[1438]: Queued start job for default target default.target. Apr 12 18:32:04.376130 systemd[1438]: Reached target paths.target. Apr 12 18:32:04.376150 systemd[1438]: Reached target sockets.target. Apr 12 18:32:04.376160 systemd[1438]: Reached target timers.target. Apr 12 18:32:04.376170 systemd[1438]: Reached target basic.target. Apr 12 18:32:04.376273 systemd[1]: Started user@500.service. Apr 12 18:32:04.377145 systemd[1]: Started session-2.scope. Apr 12 18:32:04.377991 systemd[1438]: Reached target default.target. Apr 12 18:32:04.378251 systemd[1438]: Startup finished in 390ms. Apr 12 18:32:04.738873 locksmithd[1413]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:32:04.803029 login[1432]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:32:04.807183 systemd[1]: Started session-1.scope. Apr 12 18:32:04.807549 systemd-logind[1325]: New session 1 of user core. Apr 12 18:32:12.213088 waagent[1428]: 2024-04-12T18:32:12.212974Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Apr 12 18:32:12.219608 waagent[1428]: 2024-04-12T18:32:12.219509Z INFO Daemon Daemon OS: flatcar 3510.3.3 Apr 12 18:32:12.224138 waagent[1428]: 2024-04-12T18:32:12.224062Z INFO Daemon Daemon Python: 3.9.16 Apr 12 18:32:12.230499 waagent[1428]: 2024-04-12T18:32:12.230409Z INFO Daemon Daemon Run daemon Apr 12 18:32:12.235418 waagent[1428]: 2024-04-12T18:32:12.235344Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.3' Apr 12 18:32:12.252699 waagent[1428]: 2024-04-12T18:32:12.252567Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:32:12.267599 waagent[1428]: 2024-04-12T18:32:12.267463Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:32:12.277384 waagent[1428]: 2024-04-12T18:32:12.277274Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:32:12.282596 waagent[1428]: 2024-04-12T18:32:12.282511Z INFO Daemon Daemon Using waagent for provisioning Apr 12 18:32:12.288566 waagent[1428]: 2024-04-12T18:32:12.288490Z INFO Daemon Daemon Activate resource disk Apr 12 18:32:12.293507 waagent[1428]: 2024-04-12T18:32:12.293434Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Apr 12 18:32:12.307832 waagent[1428]: 2024-04-12T18:32:12.307753Z INFO Daemon Daemon Found device: None Apr 12 18:32:12.312393 waagent[1428]: 2024-04-12T18:32:12.312329Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Apr 12 18:32:12.320659 waagent[1428]: 2024-04-12T18:32:12.320600Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Apr 12 18:32:12.332441 waagent[1428]: 2024-04-12T18:32:12.332380Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:32:12.338211 waagent[1428]: 2024-04-12T18:32:12.338152Z INFO Daemon Daemon Running default provisioning handler Apr 12 18:32:12.351108 waagent[1428]: 2024-04-12T18:32:12.350967Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:32:12.366087 waagent[1428]: 2024-04-12T18:32:12.365958Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:32:12.376156 waagent[1428]: 2024-04-12T18:32:12.376060Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:32:12.381461 waagent[1428]: 2024-04-12T18:32:12.381364Z INFO Daemon Daemon Copying ovf-env.xml Apr 12 18:32:12.469225 waagent[1428]: 2024-04-12T18:32:12.469032Z INFO Daemon Daemon Successfully mounted dvd Apr 12 18:32:12.599458 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Apr 12 18:32:12.640095 waagent[1428]: 2024-04-12T18:32:12.639954Z INFO Daemon Daemon Detect protocol endpoint Apr 12 18:32:12.645358 waagent[1428]: 2024-04-12T18:32:12.645250Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:32:12.651364 waagent[1428]: 2024-04-12T18:32:12.651257Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Apr 12 18:32:12.658135 waagent[1428]: 2024-04-12T18:32:12.658045Z INFO Daemon Daemon Test for route to 168.63.129.16 Apr 12 18:32:12.663783 waagent[1428]: 2024-04-12T18:32:12.663704Z INFO Daemon Daemon Route to 168.63.129.16 exists Apr 12 18:32:12.669045 waagent[1428]: 2024-04-12T18:32:12.668966Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Apr 12 18:32:12.835975 waagent[1428]: 2024-04-12T18:32:12.835839Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Apr 12 18:32:12.843178 waagent[1428]: 2024-04-12T18:32:12.843125Z INFO Daemon Daemon Wire protocol version:2012-11-30 Apr 12 18:32:12.848904 waagent[1428]: 2024-04-12T18:32:12.848828Z INFO Daemon Daemon Server preferred version:2015-04-05 Apr 12 18:32:13.566624 waagent[1428]: 2024-04-12T18:32:13.566475Z INFO Daemon Daemon Initializing goal state during protocol detection Apr 12 18:32:13.583845 waagent[1428]: 2024-04-12T18:32:13.583761Z INFO Daemon Daemon Forcing an update of the goal state.. Apr 12 18:32:13.589822 waagent[1428]: 2024-04-12T18:32:13.589758Z INFO Daemon Daemon Fetching goal state [incarnation 1] Apr 12 18:32:13.661470 waagent[1428]: 2024-04-12T18:32:13.661305Z INFO Daemon Daemon Found private key matching thumbprint 123D7006B8AEB18C485AB96C5863CD8FB0F5E8EE Apr 12 18:32:13.670396 waagent[1428]: 2024-04-12T18:32:13.670285Z INFO Daemon Daemon Certificate with thumbprint D3BE8A80F014D67EDFF168F94D4A39EC3E498FC1 has no matching private key. Apr 12 18:32:13.680177 waagent[1428]: 2024-04-12T18:32:13.680098Z INFO Daemon Daemon Fetch goal state completed Apr 12 18:32:13.727695 waagent[1428]: 2024-04-12T18:32:13.727637Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 40d6ec9d-a1ff-46df-b3b2-bb5ba176f45c New eTag: 9308114188875519450] Apr 12 18:32:13.738455 waagent[1428]: 2024-04-12T18:32:13.738372Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:32:13.756988 waagent[1428]: 2024-04-12T18:32:13.756925Z INFO Daemon Daemon Starting provisioning Apr 12 18:32:13.762156 waagent[1428]: 2024-04-12T18:32:13.762075Z INFO Daemon Daemon Handle ovf-env.xml. Apr 12 18:32:13.767068 waagent[1428]: 2024-04-12T18:32:13.766994Z INFO Daemon Daemon Set hostname [ci-3510.3.3-a-7076f33771] Apr 12 18:32:13.836866 waagent[1428]: 2024-04-12T18:32:13.836735Z INFO Daemon Daemon Publish hostname [ci-3510.3.3-a-7076f33771] Apr 12 18:32:13.843412 waagent[1428]: 2024-04-12T18:32:13.843327Z INFO Daemon Daemon Examine /proc/net/route for primary interface Apr 12 18:32:13.849783 waagent[1428]: 2024-04-12T18:32:13.849716Z INFO Daemon Daemon Primary interface is [eth0] Apr 12 18:32:13.865660 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Apr 12 18:32:13.865833 systemd[1]: Stopped systemd-networkd-wait-online.service. Apr 12 18:32:13.865894 systemd[1]: Stopping systemd-networkd-wait-online.service... Apr 12 18:32:13.866122 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:32:13.870350 systemd-networkd[1202]: eth0: DHCPv6 lease lost Apr 12 18:32:13.872009 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:32:13.872192 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:32:13.874231 systemd[1]: Starting systemd-networkd.service... Apr 12 18:32:13.901713 systemd-networkd[1481]: enP53392s1: Link UP Apr 12 18:32:13.901993 systemd-networkd[1481]: enP53392s1: Gained carrier Apr 12 18:32:13.902991 systemd-networkd[1481]: eth0: Link UP Apr 12 18:32:13.903071 systemd-networkd[1481]: eth0: Gained carrier Apr 12 18:32:13.903485 systemd-networkd[1481]: lo: Link UP Apr 12 18:32:13.903556 systemd-networkd[1481]: lo: Gained carrier Apr 12 18:32:13.903857 systemd-networkd[1481]: eth0: Gained IPv6LL Apr 12 18:32:13.904371 systemd-networkd[1481]: Enumeration completed Apr 12 18:32:13.905004 systemd[1]: Started systemd-networkd.service. Apr 12 18:32:13.905441 systemd-networkd[1481]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:32:13.906768 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:32:13.909989 waagent[1428]: 2024-04-12T18:32:13.909836Z INFO Daemon Daemon Create user account if not exists Apr 12 18:32:13.917175 waagent[1428]: 2024-04-12T18:32:13.916367Z INFO Daemon Daemon User core already exists, skip useradd Apr 12 18:32:13.922853 waagent[1428]: 2024-04-12T18:32:13.922746Z INFO Daemon Daemon Configure sudoer Apr 12 18:32:13.927678 waagent[1428]: 2024-04-12T18:32:13.927599Z INFO Daemon Daemon Configure sshd Apr 12 18:32:13.931840 waagent[1428]: 2024-04-12T18:32:13.931771Z INFO Daemon Daemon Deploy ssh public key. Apr 12 18:32:13.936389 systemd-networkd[1481]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:32:13.947431 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:32:15.176620 waagent[1428]: 2024-04-12T18:32:15.176536Z INFO Daemon Daemon Provisioning complete Apr 12 18:32:15.203902 waagent[1428]: 2024-04-12T18:32:15.203831Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Apr 12 18:32:15.210441 waagent[1428]: 2024-04-12T18:32:15.210354Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Apr 12 18:32:15.221588 waagent[1428]: 2024-04-12T18:32:15.221500Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Apr 12 18:32:15.569401 waagent[1490]: 2024-04-12T18:32:15.569283Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Apr 12 18:32:15.570549 waagent[1490]: 2024-04-12T18:32:15.570488Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:15.570806 waagent[1490]: 2024-04-12T18:32:15.570757Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:15.583450 waagent[1490]: 2024-04-12T18:32:15.583354Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Apr 12 18:32:15.583817 waagent[1490]: 2024-04-12T18:32:15.583766Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Apr 12 18:32:15.656237 waagent[1490]: 2024-04-12T18:32:15.656108Z INFO ExtHandler ExtHandler Found private key matching thumbprint 123D7006B8AEB18C485AB96C5863CD8FB0F5E8EE Apr 12 18:32:15.656657 waagent[1490]: 2024-04-12T18:32:15.656602Z INFO ExtHandler ExtHandler Certificate with thumbprint D3BE8A80F014D67EDFF168F94D4A39EC3E498FC1 has no matching private key. Apr 12 18:32:15.656981 waagent[1490]: 2024-04-12T18:32:15.656932Z INFO ExtHandler ExtHandler Fetch goal state completed Apr 12 18:32:15.670737 waagent[1490]: 2024-04-12T18:32:15.670679Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a63af686-5a99-46b0-9740-6e4e2ca8eafd New eTag: 9308114188875519450] Apr 12 18:32:15.671517 waagent[1490]: 2024-04-12T18:32:15.671459Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:32:15.767259 waagent[1490]: 2024-04-12T18:32:15.767113Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:32:15.807779 waagent[1490]: 2024-04-12T18:32:15.807690Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1490 Apr 12 18:32:15.811857 waagent[1490]: 2024-04-12T18:32:15.811778Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:32:15.813423 waagent[1490]: 2024-04-12T18:32:15.813357Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:32:15.957708 waagent[1490]: 2024-04-12T18:32:15.957648Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:32:15.958291 waagent[1490]: 2024-04-12T18:32:15.958233Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:32:15.966457 waagent[1490]: 2024-04-12T18:32:15.966394Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:32:15.967190 waagent[1490]: 2024-04-12T18:32:15.967128Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:32:15.968589 waagent[1490]: 2024-04-12T18:32:15.968515Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Apr 12 18:32:15.970167 waagent[1490]: 2024-04-12T18:32:15.970090Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:32:15.970560 waagent[1490]: 2024-04-12T18:32:15.970484Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:15.971150 waagent[1490]: 2024-04-12T18:32:15.971075Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:15.971846 waagent[1490]: 2024-04-12T18:32:15.971778Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:32:15.972195 waagent[1490]: 2024-04-12T18:32:15.972137Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:32:15.972195 waagent[1490]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:32:15.972195 waagent[1490]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:32:15.972195 waagent[1490]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:32:15.972195 waagent[1490]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:15.972195 waagent[1490]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:15.972195 waagent[1490]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:15.974655 waagent[1490]: 2024-04-12T18:32:15.974481Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:32:15.975562 waagent[1490]: 2024-04-12T18:32:15.975484Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:15.975756 waagent[1490]: 2024-04-12T18:32:15.975700Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:15.976394 waagent[1490]: 2024-04-12T18:32:15.976331Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:32:15.976553 waagent[1490]: 2024-04-12T18:32:15.976507Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:32:15.976671 waagent[1490]: 2024-04-12T18:32:15.976629Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:32:15.977577 waagent[1490]: 2024-04-12T18:32:15.977517Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:32:15.977738 waagent[1490]: 2024-04-12T18:32:15.977670Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:32:15.978554 waagent[1490]: 2024-04-12T18:32:15.978461Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:32:15.978742 waagent[1490]: 2024-04-12T18:32:15.978672Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:32:15.979053 waagent[1490]: 2024-04-12T18:32:15.978985Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:32:15.989445 waagent[1490]: 2024-04-12T18:32:15.989367Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Apr 12 18:32:15.990953 waagent[1490]: 2024-04-12T18:32:15.990894Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:32:15.993739 waagent[1490]: 2024-04-12T18:32:15.993672Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Apr 12 18:32:16.027129 waagent[1490]: 2024-04-12T18:32:16.027022Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1481' Apr 12 18:32:16.029578 waagent[1490]: 2024-04-12T18:32:16.029503Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Apr 12 18:32:16.115325 waagent[1490]: 2024-04-12T18:32:16.115163Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:32:16.115325 waagent[1490]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:32:16.115325 waagent[1490]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:32:16.115325 waagent[1490]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:07:52 brd ff:ff:ff:ff:ff:ff Apr 12 18:32:16.115325 waagent[1490]: 3: enP53392s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:07:52 brd ff:ff:ff:ff:ff:ff\ altname enP53392p0s2 Apr 12 18:32:16.115325 waagent[1490]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:32:16.115325 waagent[1490]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:32:16.115325 waagent[1490]: 2: eth0 inet 10.200.20.27/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:32:16.115325 waagent[1490]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:32:16.115325 waagent[1490]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:32:16.115325 waagent[1490]: 2: eth0 inet6 fe80::222:48ff:fec0:752/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:32:16.211044 waagent[1490]: 2024-04-12T18:32:16.210929Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.8 -- exiting Apr 12 18:32:17.225691 waagent[1428]: 2024-04-12T18:32:17.225557Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Apr 12 18:32:17.231645 waagent[1428]: 2024-04-12T18:32:17.231583Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.8 to be the latest agent Apr 12 18:32:18.442332 waagent[1521]: 2024-04-12T18:32:18.442215Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.8) Apr 12 18:32:18.443495 waagent[1521]: 2024-04-12T18:32:18.443429Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.3 Apr 12 18:32:18.443744 waagent[1521]: 2024-04-12T18:32:18.443695Z INFO ExtHandler ExtHandler Python: 3.9.16 Apr 12 18:32:18.443959 waagent[1521]: 2024-04-12T18:32:18.443912Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Apr 12 18:32:18.452425 waagent[1521]: 2024-04-12T18:32:18.452268Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:32:18.453055 waagent[1521]: 2024-04-12T18:32:18.452995Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:18.453346 waagent[1521]: 2024-04-12T18:32:18.453260Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:18.467257 waagent[1521]: 2024-04-12T18:32:18.467154Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Apr 12 18:32:18.480160 waagent[1521]: 2024-04-12T18:32:18.480093Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.149 Apr 12 18:32:18.481497 waagent[1521]: 2024-04-12T18:32:18.481435Z INFO ExtHandler Apr 12 18:32:18.481778 waagent[1521]: 2024-04-12T18:32:18.481727Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 551f5be5-1f93-474f-8dfc-6c843d0d0157 eTag: 9308114188875519450 source: Fabric] Apr 12 18:32:18.482667 waagent[1521]: 2024-04-12T18:32:18.482607Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Apr 12 18:32:18.484041 waagent[1521]: 2024-04-12T18:32:18.483981Z INFO ExtHandler Apr 12 18:32:18.484265 waagent[1521]: 2024-04-12T18:32:18.484216Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Apr 12 18:32:18.490845 waagent[1521]: 2024-04-12T18:32:18.490786Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Apr 12 18:32:18.491566 waagent[1521]: 2024-04-12T18:32:18.491513Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:32:18.511640 waagent[1521]: 2024-04-12T18:32:18.511573Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Apr 12 18:32:18.585730 waagent[1521]: 2024-04-12T18:32:18.585578Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D3BE8A80F014D67EDFF168F94D4A39EC3E498FC1', 'hasPrivateKey': False} Apr 12 18:32:18.587108 waagent[1521]: 2024-04-12T18:32:18.587037Z INFO ExtHandler Downloaded certificate {'thumbprint': '123D7006B8AEB18C485AB96C5863CD8FB0F5E8EE', 'hasPrivateKey': True} Apr 12 18:32:18.588390 waagent[1521]: 2024-04-12T18:32:18.588325Z INFO ExtHandler Fetch goal state completed Apr 12 18:32:18.613158 waagent[1521]: 2024-04-12T18:32:18.613029Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Apr 12 18:32:18.630464 waagent[1521]: 2024-04-12T18:32:18.630257Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.8 running as process 1521 Apr 12 18:32:18.636093 waagent[1521]: 2024-04-12T18:32:18.636000Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:32:18.638569 waagent[1521]: 2024-04-12T18:32:18.638459Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:32:18.646060 waagent[1521]: 2024-04-12T18:32:18.646001Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:32:18.646968 waagent[1521]: 2024-04-12T18:32:18.646873Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:32:18.656992 waagent[1521]: 2024-04-12T18:32:18.656923Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:32:18.657875 waagent[1521]: 2024-04-12T18:32:18.657801Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:32:18.665315 waagent[1521]: 2024-04-12T18:32:18.665164Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Apr 12 18:32:18.666772 waagent[1521]: 2024-04-12T18:32:18.666693Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Apr 12 18:32:18.668920 waagent[1521]: 2024-04-12T18:32:18.668834Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:32:18.669379 waagent[1521]: 2024-04-12T18:32:18.669267Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:18.669949 waagent[1521]: 2024-04-12T18:32:18.669869Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:18.670725 waagent[1521]: 2024-04-12T18:32:18.670646Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:32:18.671102 waagent[1521]: 2024-04-12T18:32:18.671029Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:32:18.671102 waagent[1521]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:32:18.671102 waagent[1521]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:32:18.671102 waagent[1521]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:32:18.671102 waagent[1521]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:18.671102 waagent[1521]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:18.671102 waagent[1521]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:32:18.674079 waagent[1521]: 2024-04-12T18:32:18.673933Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:32:18.677134 waagent[1521]: 2024-04-12T18:32:18.675307Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:32:18.677781 waagent[1521]: 2024-04-12T18:32:18.677637Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:32:18.678510 waagent[1521]: 2024-04-12T18:32:18.678429Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:32:18.678822 waagent[1521]: 2024-04-12T18:32:18.678740Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:32:18.679097 waagent[1521]: 2024-04-12T18:32:18.679015Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:32:18.679357 waagent[1521]: 2024-04-12T18:32:18.679257Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:32:18.681016 waagent[1521]: 2024-04-12T18:32:18.680928Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:32:18.681599 waagent[1521]: 2024-04-12T18:32:18.681527Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:32:18.681958 waagent[1521]: 2024-04-12T18:32:18.681895Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:32:18.687995 waagent[1521]: 2024-04-12T18:32:18.687820Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:32:18.695713 waagent[1521]: 2024-04-12T18:32:18.695562Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:32:18.695713 waagent[1521]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:32:18.695713 waagent[1521]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:32:18.695713 waagent[1521]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:07:52 brd ff:ff:ff:ff:ff:ff Apr 12 18:32:18.695713 waagent[1521]: 3: enP53392s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c0:07:52 brd ff:ff:ff:ff:ff:ff\ altname enP53392p0s2 Apr 12 18:32:18.695713 waagent[1521]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:32:18.695713 waagent[1521]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:32:18.695713 waagent[1521]: 2: eth0 inet 10.200.20.27/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:32:18.695713 waagent[1521]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:32:18.695713 waagent[1521]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:32:18.695713 waagent[1521]: 2: eth0 inet6 fe80::222:48ff:fec0:752/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:32:18.703772 waagent[1521]: 2024-04-12T18:32:18.703673Z INFO ExtHandler ExtHandler Downloading agent manifest Apr 12 18:32:18.747676 waagent[1521]: 2024-04-12T18:32:18.747601Z INFO ExtHandler ExtHandler Apr 12 18:32:18.748006 waagent[1521]: 2024-04-12T18:32:18.747954Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 821676ae-eb0a-44c5-aaca-df8a2d5f104b correlation c42c21a4-f29f-4889-becc-bb8c404c770a created: 2024-04-12T18:30:23.583336Z] Apr 12 18:32:18.749276 waagent[1521]: 2024-04-12T18:32:18.749216Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Apr 12 18:32:18.751260 waagent[1521]: 2024-04-12T18:32:18.751203Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Apr 12 18:32:18.774515 waagent[1521]: 2024-04-12T18:32:18.774447Z INFO ExtHandler ExtHandler Looking for existing remote access users. Apr 12 18:32:18.801162 waagent[1521]: 2024-04-12T18:32:18.800927Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.8 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 76ACB825-D8A0-48F3-88BB-10BA102A2668;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Apr 12 18:32:18.967689 waagent[1521]: 2024-04-12T18:32:18.967492Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Apr 12 18:32:18.967689 waagent[1521]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.967689 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.967689 waagent[1521]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.967689 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.967689 waagent[1521]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.967689 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.967689 waagent[1521]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:32:18.967689 waagent[1521]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:32:18.967689 waagent[1521]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:32:18.976372 waagent[1521]: 2024-04-12T18:32:18.976212Z INFO EnvHandler ExtHandler Current Firewall rules: Apr 12 18:32:18.976372 waagent[1521]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.976372 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.976372 waagent[1521]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.976372 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.976372 waagent[1521]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:32:18.976372 waagent[1521]: pkts bytes target prot opt in out source destination Apr 12 18:32:18.976372 waagent[1521]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:32:18.976372 waagent[1521]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:32:18.976372 waagent[1521]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:32:18.977252 waagent[1521]: 2024-04-12T18:32:18.977203Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Apr 12 18:32:37.660974 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Apr 12 18:32:47.150774 update_engine[1327]: I0412 18:32:47.150403 1327 update_attempter.cc:509] Updating boot flags... Apr 12 18:33:02.862243 systemd[1]: Created slice system-sshd.slice. Apr 12 18:33:02.863421 systemd[1]: Started sshd@0-10.200.20.27:22-10.200.12.6:49598.service. Apr 12 18:33:03.575475 sshd[1637]: Accepted publickey for core from 10.200.12.6 port 49598 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:03.606655 sshd[1637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:03.611353 systemd[1]: Started session-3.scope. Apr 12 18:33:03.612380 systemd-logind[1325]: New session 3 of user core. Apr 12 18:33:03.953385 systemd[1]: Started sshd@1-10.200.20.27:22-10.200.12.6:49610.service. Apr 12 18:33:04.351000 sshd[1642]: Accepted publickey for core from 10.200.12.6 port 49610 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:04.352154 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:04.356282 systemd-logind[1325]: New session 4 of user core. Apr 12 18:33:04.356760 systemd[1]: Started session-4.scope. Apr 12 18:33:04.652501 sshd[1642]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:04.655144 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:33:04.655728 systemd-logind[1325]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:33:04.655833 systemd[1]: sshd@1-10.200.20.27:22-10.200.12.6:49610.service: Deactivated successfully. Apr 12 18:33:04.657025 systemd-logind[1325]: Removed session 4. Apr 12 18:33:04.720191 systemd[1]: Started sshd@2-10.200.20.27:22-10.200.12.6:49614.service. Apr 12 18:33:05.118221 sshd[1648]: Accepted publickey for core from 10.200.12.6 port 49614 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:05.119551 sshd[1648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:05.123895 systemd[1]: Started session-5.scope. Apr 12 18:33:05.124218 systemd-logind[1325]: New session 5 of user core. Apr 12 18:33:05.416392 sshd[1648]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:05.419320 systemd[1]: sshd@2-10.200.20.27:22-10.200.12.6:49614.service: Deactivated successfully. Apr 12 18:33:05.420017 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:33:05.420581 systemd-logind[1325]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:33:05.421486 systemd-logind[1325]: Removed session 5. Apr 12 18:33:05.483892 systemd[1]: Started sshd@3-10.200.20.27:22-10.200.12.6:34654.service. Apr 12 18:33:05.884752 sshd[1654]: Accepted publickey for core from 10.200.12.6 port 34654 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:05.886385 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:05.890597 systemd[1]: Started session-6.scope. Apr 12 18:33:05.891338 systemd-logind[1325]: New session 6 of user core. Apr 12 18:33:06.182701 sshd[1654]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:06.185284 systemd[1]: sshd@3-10.200.20.27:22-10.200.12.6:34654.service: Deactivated successfully. Apr 12 18:33:06.185967 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:33:06.186706 systemd-logind[1325]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:33:06.187516 systemd-logind[1325]: Removed session 6. Apr 12 18:33:06.262492 systemd[1]: Started sshd@4-10.200.20.27:22-10.200.12.6:34666.service. Apr 12 18:33:06.691394 sshd[1660]: Accepted publickey for core from 10.200.12.6 port 34666 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:06.692673 sshd[1660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:06.696808 systemd[1]: Started session-7.scope. Apr 12 18:33:06.697102 systemd-logind[1325]: New session 7 of user core. Apr 12 18:33:07.363578 sudo[1663]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:33:07.363779 sudo[1663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:07.409257 dbus-daemon[1309]: avc: received setenforce notice (enforcing=1) Apr 12 18:33:07.409435 sudo[1663]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:07.494968 sshd[1660]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:07.497977 systemd[1]: sshd@4-10.200.20.27:22-10.200.12.6:34666.service: Deactivated successfully. Apr 12 18:33:07.498855 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:33:07.499475 systemd-logind[1325]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:33:07.500505 systemd-logind[1325]: Removed session 7. Apr 12 18:33:07.563923 systemd[1]: Started sshd@5-10.200.20.27:22-10.200.12.6:34678.service. Apr 12 18:33:07.968555 sshd[1667]: Accepted publickey for core from 10.200.12.6 port 34678 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:07.969859 sshd[1667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:07.973681 systemd-logind[1325]: New session 8 of user core. Apr 12 18:33:07.974077 systemd[1]: Started session-8.scope. Apr 12 18:33:08.202092 sudo[1671]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:33:08.202327 sudo[1671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:08.204887 sudo[1671]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:08.209458 sudo[1670]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:33:08.209957 sudo[1670]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:08.218944 systemd[1]: Stopping audit-rules.service... Apr 12 18:33:08.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:33:08.224509 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 18:33:08.224580 kernel: audit: type=1305 audit(1712946788.219:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:33:08.235040 auditctl[1674]: No rules Apr 12 18:33:08.219000 audit[1674]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb210210 a2=420 a3=0 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.235695 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:33:08.235873 systemd[1]: Stopped audit-rules.service. Apr 12 18:33:08.237596 systemd[1]: Starting audit-rules.service... Apr 12 18:33:08.257646 kernel: audit: type=1300 audit(1712946788.219:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb210210 a2=420 a3=0 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:33:08.264734 kernel: audit: type=1327 audit(1712946788.219:171): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:33:08.264837 kernel: audit: type=1131 audit(1712946788.234:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.274373 augenrules[1691]: No rules Apr 12 18:33:08.275379 systemd[1]: Finished audit-rules.service. Apr 12 18:33:08.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.282679 sudo[1670]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:08.297775 kernel: audit: type=1130 audit(1712946788.274:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.297893 kernel: audit: type=1106 audit(1712946788.281:174): pid=1670 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.281000 audit[1670]: USER_END pid=1670 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.281000 audit[1670]: CRED_DISP pid=1670 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.332580 kernel: audit: type=1104 audit(1712946788.281:175): pid=1670 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.354495 sshd[1667]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:08.354000 audit[1667]: USER_END pid=1667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.378735 systemd[1]: sshd@5-10.200.20.27:22-10.200.12.6:34678.service: Deactivated successfully. Apr 12 18:33:08.354000 audit[1667]: CRED_DISP pid=1667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.397353 kernel: audit: type=1106 audit(1712946788.354:176): pid=1667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.397426 kernel: audit: type=1104 audit(1712946788.354:177): pid=1667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.379507 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:33:08.380410 systemd-logind[1325]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:33:08.381161 systemd-logind[1325]: Removed session 8. Apr 12 18:33:08.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.27:22-10.200.12.6:34678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.415075 kernel: audit: type=1131 audit(1712946788.377:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.27:22-10.200.12.6:34678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.27:22-10.200.12.6:34692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:08.425636 systemd[1]: Started sshd@6-10.200.20.27:22-10.200.12.6:34692.service. Apr 12 18:33:08.824000 audit[1697]: USER_ACCT pid=1697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.825799 sshd[1697]: Accepted publickey for core from 10.200.12.6 port 34692 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:08.825000 audit[1697]: CRED_ACQ pid=1697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.825000 audit[1697]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6088130 a2=3 a3=1 items=0 ppid=1 pid=1697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:08.827401 sshd[1697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:08.831548 systemd[1]: Started session-9.scope. Apr 12 18:33:08.832347 systemd-logind[1325]: New session 9 of user core. Apr 12 18:33:08.835000 audit[1697]: USER_START pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:08.836000 audit[1699]: CRED_ACQ pid=1699 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:09.057000 audit[1700]: USER_ACCT pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:09.058535 sudo[1700]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:33:09.057000 audit[1700]: CRED_REFR pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:09.058739 sudo[1700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:33:09.058000 audit[1700]: USER_START pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:09.808631 systemd[1]: Starting docker.service... Apr 12 18:33:09.857767 env[1715]: time="2024-04-12T18:33:09.857708281Z" level=info msg="Starting up" Apr 12 18:33:09.859121 env[1715]: time="2024-04-12T18:33:09.859093960Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:33:09.859121 env[1715]: time="2024-04-12T18:33:09.859116113Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:33:09.859226 env[1715]: time="2024-04-12T18:33:09.859142145Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:33:09.859226 env[1715]: time="2024-04-12T18:33:09.859153181Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:33:09.860892 env[1715]: time="2024-04-12T18:33:09.860872594Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:33:09.860982 env[1715]: time="2024-04-12T18:33:09.860968163Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:33:09.861043 env[1715]: time="2024-04-12T18:33:09.861027344Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:33:09.861094 env[1715]: time="2024-04-12T18:33:09.861082647Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:33:09.866369 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2298417930-merged.mount: Deactivated successfully. Apr 12 18:33:10.048463 env[1715]: time="2024-04-12T18:33:10.048422681Z" level=info msg="Loading containers: start." Apr 12 18:33:10.180000 audit[1742]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.180000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffde410e30 a2=0 a3=1 items=0 ppid=1715 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:33:10.182000 audit[1744]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.182000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffca0c8240 a2=0 a3=1 items=0 ppid=1715 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:33:10.184000 audit[1746]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.184000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd74f91c0 a2=0 a3=1 items=0 ppid=1715 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:33:10.185000 audit[1748]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.185000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff28d7c40 a2=0 a3=1 items=0 ppid=1715 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:33:10.187000 audit[1750]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.187000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff5ac4a30 a2=0 a3=1 items=0 ppid=1715 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:33:10.189000 audit[1752]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.189000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd04badc0 a2=0 a3=1 items=0 ppid=1715 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:33:10.207000 audit[1754]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.207000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe879a1d0 a2=0 a3=1 items=0 ppid=1715 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:33:10.209000 audit[1756]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.209000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd3b34730 a2=0 a3=1 items=0 ppid=1715 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:33:10.211000 audit[1758]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.211000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff690b600 a2=0 a3=1 items=0 ppid=1715 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:33:10.229000 audit[1762]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.229000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcdc43270 a2=0 a3=1 items=0 ppid=1715 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:33:10.230000 audit[1763]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.230000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc8389f10 a2=0 a3=1 items=0 ppid=1715 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.230000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:33:10.260335 kernel: Initializing XFRM netlink socket Apr 12 18:33:10.306450 env[1715]: time="2024-04-12T18:33:10.306417608Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:33:10.385000 audit[1771]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.385000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd202cdf0 a2=0 a3=1 items=0 ppid=1715 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:33:10.426000 audit[1774]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.426000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd90470b0 a2=0 a3=1 items=0 ppid=1715 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:33:10.429000 audit[1777]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.429000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff8538ac0 a2=0 a3=1 items=0 ppid=1715 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:33:10.431000 audit[1779]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.431000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd0fdd870 a2=0 a3=1 items=0 ppid=1715 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:33:10.434000 audit[1781]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.434000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffcf64f020 a2=0 a3=1 items=0 ppid=1715 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:33:10.436000 audit[1783]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.436000 audit[1783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffff6cc8b0 a2=0 a3=1 items=0 ppid=1715 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:33:10.438000 audit[1785]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.438000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff9342070 a2=0 a3=1 items=0 ppid=1715 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:33:10.440000 audit[1787]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.440000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd17b49d0 a2=0 a3=1 items=0 ppid=1715 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:33:10.442000 audit[1789]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.442000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffcdabea0 a2=0 a3=1 items=0 ppid=1715 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:33:10.444000 audit[1791]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.444000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc080d190 a2=0 a3=1 items=0 ppid=1715 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:33:10.445000 audit[1793]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.445000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffd4b8280 a2=0 a3=1 items=0 ppid=1715 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:33:10.446753 systemd-networkd[1481]: docker0: Link UP Apr 12 18:33:10.471000 audit[1797]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.471000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdb162280 a2=0 a3=1 items=0 ppid=1715 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:33:10.472000 audit[1798]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:10.472000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd81f9670 a2=0 a3=1 items=0 ppid=1715 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:10.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:33:10.472881 env[1715]: time="2024-04-12T18:33:10.472845512Z" level=info msg="Loading containers: done." Apr 12 18:33:10.481223 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck716780380-merged.mount: Deactivated successfully. Apr 12 18:33:10.540099 env[1715]: time="2024-04-12T18:33:10.540057323Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:33:10.540522 env[1715]: time="2024-04-12T18:33:10.540503265Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:33:10.540713 env[1715]: time="2024-04-12T18:33:10.540698284Z" level=info msg="Daemon has completed initialization" Apr 12 18:33:10.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:10.573608 systemd[1]: Started docker.service. Apr 12 18:33:10.584198 env[1715]: time="2024-04-12T18:33:10.584132864Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:33:10.600106 systemd[1]: Reloading. Apr 12 18:33:10.660479 /usr/lib/systemd/system-generators/torcx-generator[1844]: time="2024-04-12T18:33:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:33:10.660510 /usr/lib/systemd/system-generators/torcx-generator[1844]: time="2024-04-12T18:33:10Z" level=info msg="torcx already run" Apr 12 18:33:10.737369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:33:10.737388 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:33:10.752577 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:33:10.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.820000 audit: BPF prog-id=35 op=LOAD Apr 12 18:33:10.820000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.822000 audit: BPF prog-id=36 op=LOAD Apr 12 18:33:10.822000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit: BPF prog-id=37 op=LOAD Apr 12 18:33:10.823000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit: BPF prog-id=38 op=LOAD Apr 12 18:33:10.824000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit: BPF prog-id=39 op=LOAD Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit: BPF prog-id=40 op=LOAD Apr 12 18:33:10.824000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:33:10.824000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit: BPF prog-id=41 op=LOAD Apr 12 18:33:10.824000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit: BPF prog-id=42 op=LOAD Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit: BPF prog-id=43 op=LOAD Apr 12 18:33:10.825000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:33:10.825000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit: BPF prog-id=44 op=LOAD Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.825000 audit: BPF prog-id=45 op=LOAD Apr 12 18:33:10.825000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:33:10.825000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:33:10.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit: BPF prog-id=46 op=LOAD Apr 12 18:33:10.827000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit: BPF prog-id=47 op=LOAD Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit: BPF prog-id=48 op=LOAD Apr 12 18:33:10.827000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:33:10.827000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:10.828000 audit: BPF prog-id=49 op=LOAD Apr 12 18:33:10.828000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:33:10.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:10.835249 systemd[1]: Started kubelet.service. Apr 12 18:33:10.894079 kubelet[1903]: E0412 18:33:10.894021 1903 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:33:10.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:10.896594 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:33:10.896714 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:33:15.708851 env[1336]: time="2024-04-12T18:33:15.708573868Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 18:33:16.681604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount44713695.mount: Deactivated successfully. Apr 12 18:33:18.294888 env[1336]: time="2024-04-12T18:33:18.294679163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:18.303434 env[1336]: time="2024-04-12T18:33:18.303379818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d4d4d261fc80c6c87ea30cb7d2b1a53b684be80fb7af5e16a2c97371e669f19f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:18.308020 env[1336]: time="2024-04-12T18:33:18.307968906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:18.312901 env[1336]: time="2024-04-12T18:33:18.312854319Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:18.313676 env[1336]: time="2024-04-12T18:33:18.313647400Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:d4d4d261fc80c6c87ea30cb7d2b1a53b684be80fb7af5e16a2c97371e669f19f\"" Apr 12 18:33:18.324101 env[1336]: time="2024-04-12T18:33:18.324068023Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 18:33:20.410341 env[1336]: time="2024-04-12T18:33:20.410269183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:20.429332 env[1336]: time="2024-04-12T18:33:20.429278927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a4a7509f59f7f027d7c434948b3b8e5463b835d28675c76c6d1ff21d2c4e8f18,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:20.438822 env[1336]: time="2024-04-12T18:33:20.438764464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:20.447504 env[1336]: time="2024-04-12T18:33:20.447461268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:20.448053 env[1336]: time="2024-04-12T18:33:20.448025734Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:a4a7509f59f7f027d7c434948b3b8e5463b835d28675c76c6d1ff21d2c4e8f18\"" Apr 12 18:33:20.457498 env[1336]: time="2024-04-12T18:33:20.457456643Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 18:33:20.938836 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:33:20.939001 systemd[1]: Stopped kubelet.service. Apr 12 18:33:20.944601 kernel: kauditd_printk_skb: 258 callbacks suppressed Apr 12 18:33:20.944712 kernel: audit: type=1130 audit(1712946800.937:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:20.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:20.940571 systemd[1]: Started kubelet.service. Apr 12 18:33:20.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:20.977646 kernel: audit: type=1131 audit(1712946800.937:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:20.995426 kernel: audit: type=1130 audit(1712946800.939:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:20.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:21.037371 kubelet[1934]: E0412 18:33:21.037087 1934 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:33:21.040361 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:33:21.040508 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:33:21.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:21.058481 kernel: audit: type=1131 audit(1712946801.039:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:21.773308 env[1336]: time="2024-04-12T18:33:21.773246668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.781584 env[1336]: time="2024-04-12T18:33:21.781528101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5de6108d9220f19bcc35bf81a2879e5ff2f6506c08af260c116b803579db675b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.787390 env[1336]: time="2024-04-12T18:33:21.787345468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.792328 env[1336]: time="2024-04-12T18:33:21.792270762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.792956 env[1336]: time="2024-04-12T18:33:21.792924570Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5de6108d9220f19bcc35bf81a2879e5ff2f6506c08af260c116b803579db675b\"" Apr 12 18:33:21.801803 env[1336]: time="2024-04-12T18:33:21.801760754Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:33:23.053565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2808432318.mount: Deactivated successfully. Apr 12 18:33:23.853531 env[1336]: time="2024-04-12T18:33:23.853474900Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.864685 env[1336]: time="2024-04-12T18:33:23.864638189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.869333 env[1336]: time="2024-04-12T18:33:23.869271364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.876664 env[1336]: time="2024-04-12T18:33:23.876630695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.876986 env[1336]: time="2024-04-12T18:33:23.876957503Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06\"" Apr 12 18:33:23.885768 env[1336]: time="2024-04-12T18:33:23.885729882Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:33:24.504601 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3849466788.mount: Deactivated successfully. Apr 12 18:33:24.531640 env[1336]: time="2024-04-12T18:33:24.531589591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:24.540141 env[1336]: time="2024-04-12T18:33:24.540093995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:24.548264 env[1336]: time="2024-04-12T18:33:24.548227479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:24.553440 env[1336]: time="2024-04-12T18:33:24.553408921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:24.553943 env[1336]: time="2024-04-12T18:33:24.553916771Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:33:24.563113 env[1336]: time="2024-04-12T18:33:24.563078153Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 18:33:25.394357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount111408864.mount: Deactivated successfully. Apr 12 18:33:28.628840 env[1336]: time="2024-04-12T18:33:28.628775438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:28.634883 env[1336]: time="2024-04-12T18:33:28.634822574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:28.639417 env[1336]: time="2024-04-12T18:33:28.639377442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:28.646395 env[1336]: time="2024-04-12T18:33:28.646356435Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:28.647025 env[1336]: time="2024-04-12T18:33:28.646998029Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Apr 12 18:33:28.656021 env[1336]: time="2024-04-12T18:33:28.655973112Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:33:29.384319 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2600087040.mount: Deactivated successfully. Apr 12 18:33:29.853420 env[1336]: time="2024-04-12T18:33:29.853372111Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.862462 env[1336]: time="2024-04-12T18:33:29.862422701Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.868350 env[1336]: time="2024-04-12T18:33:29.868314854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.873487 env[1336]: time="2024-04-12T18:33:29.873449792Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:29.874097 env[1336]: time="2024-04-12T18:33:29.874066474Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 18:33:31.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.188773 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:33:31.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.188950 systemd[1]: Stopped kubelet.service. Apr 12 18:33:31.225213 systemd[1]: Started kubelet.service. Apr 12 18:33:31.226036 kernel: audit: type=1130 audit(1712946811.188:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.226105 kernel: audit: type=1131 audit(1712946811.188:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.246019 kernel: audit: type=1130 audit(1712946811.225:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.303638 kubelet[2021]: E0412 18:33:31.303556 2021 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:33:31.305130 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:33:31.305261 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:33:31.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:31.324312 kernel: audit: type=1131 audit(1712946811.305:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:33:35.782156 systemd[1]: Stopped kubelet.service. Apr 12 18:33:35.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:35.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:35.819972 kernel: audit: type=1130 audit(1712946815.781:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:35.820053 kernel: audit: type=1131 audit(1712946815.781:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:35.836572 systemd[1]: Reloading. Apr 12 18:33:35.921824 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2024-04-12T18:33:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:33:35.921855 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2024-04-12T18:33:35Z" level=info msg="torcx already run" Apr 12 18:33:35.992532 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:33:35.992550 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:33:36.007599 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113538 kernel: audit: type=1400 audit(1712946816.078:397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113665 kernel: audit: type=1400 audit(1712946816.078:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113735 kernel: audit: type=1400 audit(1712946816.078:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147511 kernel: audit: type=1400 audit(1712946816.078:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit: BPF prog-id=50 op=LOAD Apr 12 18:33:36.096000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit: BPF prog-id=51 op=LOAD Apr 12 18:33:36.113000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit: BPF prog-id=52 op=LOAD Apr 12 18:33:36.129000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=53 op=LOAD Apr 12 18:33:36.147000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=54 op=LOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=55 op=LOAD Apr 12 18:33:36.147000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:33:36.147000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=56 op=LOAD Apr 12 18:33:36.147000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=59 op=LOAD Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.147000 audit: BPF prog-id=60 op=LOAD Apr 12 18:33:36.147000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:33:36.147000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit: BPF prog-id=61 op=LOAD Apr 12 18:33:36.149000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit: BPF prog-id=62 op=LOAD Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit: BPF prog-id=63 op=LOAD Apr 12 18:33:36.149000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:33:36.149000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.150000 audit: BPF prog-id=64 op=LOAD Apr 12 18:33:36.150000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:33:36.169051 systemd[1]: Started kubelet.service. Apr 12 18:33:36.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:36.231340 kubelet[2112]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:36.231658 kubelet[2112]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:33:36.231706 kubelet[2112]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:36.231831 kubelet[2112]: I0412 18:33:36.231798 2112 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:33:36.583702 kubelet[2112]: I0412 18:33:36.583675 2112 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:33:36.583889 kubelet[2112]: I0412 18:33:36.583879 2112 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:33:36.584181 kubelet[2112]: I0412 18:33:36.584166 2112 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:33:36.589615 kubelet[2112]: E0412 18:33:36.589596 2112 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.27:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.589814 kubelet[2112]: I0412 18:33:36.589802 2112 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:33:36.590392 kubelet[2112]: W0412 18:33:36.590376 2112 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:33:36.590888 kubelet[2112]: I0412 18:33:36.590871 2112 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:33:36.591076 kubelet[2112]: I0412 18:33:36.591063 2112 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:33:36.591160 kubelet[2112]: I0412 18:33:36.591135 2112 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:33:36.591239 kubelet[2112]: I0412 18:33:36.591170 2112 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:33:36.591239 kubelet[2112]: I0412 18:33:36.591180 2112 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:33:36.591290 kubelet[2112]: I0412 18:33:36.591268 2112 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:36.596215 kubelet[2112]: I0412 18:33:36.596188 2112 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:33:36.596380 kubelet[2112]: I0412 18:33:36.596364 2112 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:33:36.596428 kubelet[2112]: I0412 18:33:36.596396 2112 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:33:36.596428 kubelet[2112]: I0412 18:33:36.596410 2112 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:33:36.597407 kubelet[2112]: I0412 18:33:36.597390 2112 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:33:36.598565 kubelet[2112]: W0412 18:33:36.598547 2112 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:33:36.599062 kubelet[2112]: I0412 18:33:36.599042 2112 server.go:1168] "Started kubelet" Apr 12 18:33:36.599232 kubelet[2112]: W0412 18:33:36.599193 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.27:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.599341 kubelet[2112]: E0412 18:33:36.599330 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.27:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.600000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.604479 kubelet[2112]: E0412 18:33:36.601988 2112 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-7076f33771.17c59c0dda853af0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-7076f33771", UID:"ci-3510.3.3-a-7076f33771", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-7076f33771"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 599014128, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 599014128, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.27:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.27:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:33:36.604479 kubelet[2112]: I0412 18:33:36.602290 2112 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:33:36.604479 kubelet[2112]: I0412 18:33:36.602887 2112 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:33:36.604479 kubelet[2112]: I0412 18:33:36.603751 2112 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:33:36.604479 kubelet[2112]: W0412 18:33:36.604154 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.27:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-7076f33771&limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.604676 kubelet[2112]: E0412 18:33:36.604191 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.27:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-7076f33771&limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.604792 kubelet[2112]: I0412 18:33:36.604780 2112 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:33:36.604886 kubelet[2112]: I0412 18:33:36.604876 2112 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:33:36.605018 kubelet[2112]: I0412 18:33:36.605005 2112 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:33:36.605924 kernel: kauditd_printk_skb: 199 callbacks suppressed Apr 12 18:33:36.606003 kernel: audit: type=1400 audit(1712946816.600:555): avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.610551 kubelet[2112]: I0412 18:33:36.610531 2112 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:33:36.612745 kubelet[2112]: I0412 18:33:36.612723 2112 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:33:36.624302 kubelet[2112]: E0412 18:33:36.624253 2112 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": dial tcp 10.200.20.27:6443: connect: connection refused" interval="200ms" Apr 12 18:33:36.625610 kubelet[2112]: E0412 18:33:36.625415 2112 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:33:36.625610 kubelet[2112]: E0412 18:33:36.625445 2112 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:33:36.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:36.626229 kubelet[2112]: W0412 18:33:36.625750 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.27:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.626229 kubelet[2112]: E0412 18:33:36.625799 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.27:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.635615 kernel: audit: type=1401 audit(1712946816.600:555): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:36.600000 audit[2112]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bbb3b0 a1=4000b92a50 a2=4000bbb380 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.666242 kernel: audit: type=1300 audit(1712946816.600:555): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bbb3b0 a1=4000b92a50 a2=4000bbb380 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.600000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:36.691180 kernel: audit: type=1327 audit(1712946816.600:555): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:36.600000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.709681 kernel: audit: type=1400 audit(1712946816.600:556): avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:36.719233 kernel: audit: type=1401 audit(1712946816.600:556): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:36.600000 audit[2112]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400082c940 a1=4000b92a68 a2=4000bbb440 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.745325 kernel: audit: type=1300 audit(1712946816.600:556): arch=c00000b7 syscall=5 success=no exit=-22 a0=400082c940 a1=4000b92a68 a2=4000bbb440 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.746920 kubelet[2112]: I0412 18:33:36.746897 2112 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:33:36.600000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:36.755452 kubelet[2112]: I0412 18:33:36.751264 2112 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:33:36.755452 kubelet[2112]: I0412 18:33:36.751289 2112 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:33:36.755452 kubelet[2112]: I0412 18:33:36.751331 2112 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:33:36.755452 kubelet[2112]: E0412 18:33:36.751382 2112 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:33:36.772014 kernel: audit: type=1327 audit(1712946816.600:556): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:36.605000 audit[2122]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.772831 kubelet[2112]: W0412 18:33:36.772796 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.27:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.772946 kubelet[2112]: E0412 18:33:36.772935 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.27:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:36.786030 kernel: audit: type=1325 audit(1712946816.605:557): table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.605000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc0c48300 a2=0 a3=1 items=0 ppid=2112 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.787572 kubelet[2112]: I0412 18:33:36.787543 2112 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:36.787994 kubelet[2112]: E0412 18:33:36.787974 2112 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.27:6443/api/v1/nodes\": dial tcp 10.200.20.27:6443: connect: connection refused" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:36.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:33:36.605000 audit[2123]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.605000 audit[2123]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6ecb070 a2=0 a3=1 items=0 ppid=2112 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:33:36.611000 audit[2125]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.611000 audit[2125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd4996820 a2=0 a3=1 items=0 ppid=2112 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:36.611000 audit[2127]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.611000 audit[2127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffa491d00 a2=0 a3=1 items=0 ppid=2112 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:36.746000 audit[2134]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.746000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd90aa000 a2=0 a3=1 items=0 ppid=2112 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:33:36.748000 audit[2136]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.748000 audit[2136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2d29ac0 a2=0 a3=1 items=0 ppid=2112 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:33:36.815332 kernel: audit: type=1300 audit(1712946816.605:557): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc0c48300 a2=0 a3=1 items=0 ppid=2112 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.749000 audit[2137]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.749000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdae54fe0 a2=0 a3=1 items=0 ppid=2112 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:33:36.749000 audit[2138]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:36.749000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe30ff4d0 a2=0 a3=1 items=0 ppid=2112 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:33:36.750000 audit[2139]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:36.750000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdd69eea0 a2=0 a3=1 items=0 ppid=2112 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:33:36.751000 audit[2140]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:36.751000 audit[2140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7ed8960 a2=0 a3=1 items=0 ppid=2112 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.751000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:33:36.752000 audit[2141]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:36.752000 audit[2141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffd85f8b0 a2=0 a3=1 items=0 ppid=2112 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:33:36.753000 audit[2142]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:36.753000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc07dd5a0 a2=0 a3=1 items=0 ppid=2112 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:33:36.816626 kubelet[2112]: I0412 18:33:36.816607 2112 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:33:36.816749 kubelet[2112]: I0412 18:33:36.816739 2112 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:33:36.816807 kubelet[2112]: I0412 18:33:36.816799 2112 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:36.824698 kubelet[2112]: I0412 18:33:36.824674 2112 policy_none.go:49] "None policy: Start" Apr 12 18:33:36.825045 kubelet[2112]: E0412 18:33:36.825033 2112 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": dial tcp 10.200.20.27:6443: connect: connection refused" interval="400ms" Apr 12 18:33:36.825519 kubelet[2112]: I0412 18:33:36.825472 2112 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:33:36.825651 kubelet[2112]: I0412 18:33:36.825641 2112 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:33:36.851869 kubelet[2112]: E0412 18:33:36.851777 2112 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:33:36.859313 systemd[1]: Created slice kubepods.slice. Apr 12 18:33:36.863333 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:33:36.866011 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:33:36.875289 kubelet[2112]: I0412 18:33:36.875199 2112 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:33:36.875289 kubelet[2112]: I0412 18:33:36.875269 2112 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:33:36.874000 audit[2112]: AVC avc: denied { mac_admin } for pid=2112 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:36.874000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:36.874000 audit[2112]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001098180 a1=4000fd9170 a2=4001098150 a3=25 items=0 ppid=1 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:36.874000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:36.876382 kubelet[2112]: I0412 18:33:36.876286 2112 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:33:36.877183 kubelet[2112]: E0412 18:33:36.877126 2112 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-7076f33771\" not found" Apr 12 18:33:36.990291 kubelet[2112]: I0412 18:33:36.990268 2112 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:36.990797 kubelet[2112]: E0412 18:33:36.990784 2112 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.27:6443/api/v1/nodes\": dial tcp 10.200.20.27:6443: connect: connection refused" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.052191 kubelet[2112]: I0412 18:33:37.052169 2112 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:37.053567 kubelet[2112]: I0412 18:33:37.053542 2112 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:37.054860 kubelet[2112]: I0412 18:33:37.054841 2112 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:37.058827 systemd[1]: Created slice kubepods-burstable-pod8d0cea62f035e55be6481ea9677b85ae.slice. Apr 12 18:33:37.069875 systemd[1]: Created slice kubepods-burstable-pod3c4216338621229228ecb0a07b12d357.slice. Apr 12 18:33:37.074158 systemd[1]: Created slice kubepods-burstable-pod19016fb7f3ef51ac3333389b6704fc3b.slice. Apr 12 18:33:37.122331 kubelet[2112]: I0412 18:33:37.121654 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122331 kubelet[2112]: I0412 18:33:37.121696 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122331 kubelet[2112]: I0412 18:33:37.121715 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122331 kubelet[2112]: I0412 18:33:37.121733 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122331 kubelet[2112]: I0412 18:33:37.121753 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122540 kubelet[2112]: I0412 18:33:37.121782 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3c4216338621229228ecb0a07b12d357-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-7076f33771\" (UID: \"3c4216338621229228ecb0a07b12d357\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122540 kubelet[2112]: I0412 18:33:37.121800 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122540 kubelet[2112]: I0412 18:33:37.121822 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.122540 kubelet[2112]: I0412 18:33:37.121842 2112 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.226338 kubelet[2112]: E0412 18:33:37.226281 2112 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": dial tcp 10.200.20.27:6443: connect: connection refused" interval="800ms" Apr 12 18:33:37.368594 env[1336]: time="2024-04-12T18:33:37.368547118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-7076f33771,Uid:8d0cea62f035e55be6481ea9677b85ae,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:37.373351 env[1336]: time="2024-04-12T18:33:37.373060440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-7076f33771,Uid:3c4216338621229228ecb0a07b12d357,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:37.377408 env[1336]: time="2024-04-12T18:33:37.377250014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-7076f33771,Uid:19016fb7f3ef51ac3333389b6704fc3b,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:37.394409 kubelet[2112]: I0412 18:33:37.394384 2112 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.395107 kubelet[2112]: E0412 18:33:37.395092 2112 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.27:6443/api/v1/nodes\": dial tcp 10.200.20.27:6443: connect: connection refused" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:37.644303 kubelet[2112]: W0412 18:33:37.644189 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.27:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:37.644303 kubelet[2112]: E0412 18:33:37.644229 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.27:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:37.721837 kubelet[2112]: W0412 18:33:37.721802 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.27:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:37.722020 kubelet[2112]: E0412 18:33:37.722009 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.27:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:37.754797 kubelet[2112]: W0412 18:33:37.754765 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.27:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-7076f33771&limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:37.754974 kubelet[2112]: E0412 18:33:37.754962 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.27:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-7076f33771&limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:38.027461 kubelet[2112]: E0412 18:33:38.027429 2112 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": dial tcp 10.200.20.27:6443: connect: connection refused" interval="1.6s" Apr 12 18:33:38.051935 kubelet[2112]: W0412 18:33:38.051860 2112 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.27:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:38.051935 kubelet[2112]: E0412 18:33:38.051897 2112 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.27:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:38.169669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1176066416.mount: Deactivated successfully. Apr 12 18:33:38.197091 kubelet[2112]: I0412 18:33:38.196824 2112 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:38.197230 kubelet[2112]: E0412 18:33:38.197143 2112 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.27:6443/api/v1/nodes\": dial tcp 10.200.20.27:6443: connect: connection refused" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:38.199192 env[1336]: time="2024-04-12T18:33:38.199152522Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.224550 env[1336]: time="2024-04-12T18:33:38.224506137Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.236149 env[1336]: time="2024-04-12T18:33:38.236109651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.240307 env[1336]: time="2024-04-12T18:33:38.240250007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.244723 env[1336]: time="2024-04-12T18:33:38.244689876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.248618 env[1336]: time="2024-04-12T18:33:38.248577431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.259012 env[1336]: time="2024-04-12T18:33:38.258960416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.263756 env[1336]: time="2024-04-12T18:33:38.263721595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.271198 env[1336]: time="2024-04-12T18:33:38.271157358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.279037 env[1336]: time="2024-04-12T18:33:38.278933148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.300179 env[1336]: time="2024-04-12T18:33:38.300123091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.323092 env[1336]: time="2024-04-12T18:33:38.323050443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:38.381727 env[1336]: time="2024-04-12T18:33:38.381535703Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:38.381727 env[1336]: time="2024-04-12T18:33:38.381574617Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:38.381727 env[1336]: time="2024-04-12T18:33:38.381584976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:38.382081 env[1336]: time="2024-04-12T18:33:38.381784665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97 pid=2149 runtime=io.containerd.runc.v2 Apr 12 18:33:38.395657 systemd[1]: Started cri-containerd-7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97.scope. Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.417000 audit: BPF prog-id=65 op=LOAD Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400023db38 a2=10 a3=0 items=0 ppid=2149 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739313861613865383538663135333864643539313065343236376662 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400023d5a0 a2=3c a3=0 items=0 ppid=2149 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739313861613865383538663135333864643539313065343236376662 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.418000 audit: BPF prog-id=66 op=LOAD Apr 12 18:33:38.418000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400023d8e0 a2=78 a3=0 items=0 ppid=2149 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739313861613865383538663135333864643539313065343236376662 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.419000 audit: BPF prog-id=67 op=LOAD Apr 12 18:33:38.419000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400023d670 a2=78 a3=0 items=0 ppid=2149 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739313861613865383538663135333864643539313065343236376662 Apr 12 18:33:38.419000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:33:38.420000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { perfmon } for pid=2160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit[2160]: AVC avc: denied { bpf } for pid=2160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.420000 audit: BPF prog-id=68 op=LOAD Apr 12 18:33:38.420000 audit[2160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400023db40 a2=78 a3=0 items=0 ppid=2149 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739313861613865383538663135333864643539313065343236376662 Apr 12 18:33:38.428388 env[1336]: time="2024-04-12T18:33:38.427672045Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:38.428388 env[1336]: time="2024-04-12T18:33:38.427749272Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:38.428388 env[1336]: time="2024-04-12T18:33:38.427774749Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:38.428388 env[1336]: time="2024-04-12T18:33:38.428189364Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ab879ac2c8cde9ff3b4a3f25faa6948edd03eb19e5936afd6ed173bb6c27a50 pid=2184 runtime=io.containerd.runc.v2 Apr 12 18:33:38.445370 systemd[1]: Started cri-containerd-8ab879ac2c8cde9ff3b4a3f25faa6948edd03eb19e5936afd6ed173bb6c27a50.scope. Apr 12 18:33:38.458754 env[1336]: time="2024-04-12T18:33:38.458668941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-7076f33771,Uid:8d0cea62f035e55be6481ea9677b85ae,Namespace:kube-system,Attempt:0,} returns sandbox id \"7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97\"" Apr 12 18:33:38.460398 env[1336]: time="2024-04-12T18:33:38.458710455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:38.460604 env[1336]: time="2024-04-12T18:33:38.460532691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:38.460604 env[1336]: time="2024-04-12T18:33:38.460560527Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:38.462633 env[1336]: time="2024-04-12T18:33:38.461830729Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b pid=2221 runtime=io.containerd.runc.v2 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.464000 audit: BPF prog-id=69 op=LOAD Apr 12 18:33:38.465000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466810 env[1336]: time="2024-04-12T18:33:38.466774040Z" level=info msg="CreateContainer within sandbox \"7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:33:38.465000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2184 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623837396163326338636465396666336234613366323566616136 Apr 12 18:33:38.465000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.465000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2184 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623837396163326338636465396666336234613366323566616136 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit: BPF prog-id=70 op=LOAD Apr 12 18:33:38.466000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2184 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623837396163326338636465396666336234613366323566616136 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.466000 audit: BPF prog-id=71 op=LOAD Apr 12 18:33:38.466000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2184 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623837396163326338636465396666336234613366323566616136 Apr 12 18:33:38.467000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:33:38.467000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.467000 audit: BPF prog-id=72 op=LOAD Apr 12 18:33:38.467000 audit[2195]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2184 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623837396163326338636465396666336234613366323566616136 Apr 12 18:33:38.490155 systemd[1]: Started cri-containerd-40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b.scope. Apr 12 18:33:38.498519 env[1336]: time="2024-04-12T18:33:38.498473028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-7076f33771,Uid:19016fb7f3ef51ac3333389b6704fc3b,Namespace:kube-system,Attempt:0,} returns sandbox id \"8ab879ac2c8cde9ff3b4a3f25faa6948edd03eb19e5936afd6ed173bb6c27a50\"" Apr 12 18:33:38.503428 env[1336]: time="2024-04-12T18:33:38.503387223Z" level=info msg="CreateContainer within sandbox \"8ab879ac2c8cde9ff3b4a3f25faa6948edd03eb19e5936afd6ed173bb6c27a50\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit: BPF prog-id=73 op=LOAD Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2221 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613861313432386463643461663135656435623163653937393831 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2221 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613861313432386463643461663135656435623163653937393831 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit: BPF prog-id=74 op=LOAD Apr 12 18:33:38.508000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2221 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613861313432386463643461663135656435623163653937393831 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit: BPF prog-id=75 op=LOAD Apr 12 18:33:38.508000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2221 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613861313432386463643461663135656435623163653937393831 Apr 12 18:33:38.508000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:33:38.508000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.508000 audit: BPF prog-id=76 op=LOAD Apr 12 18:33:38.508000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2221 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430613861313432386463643461663135656435623163653937393831 Apr 12 18:33:38.528022 env[1336]: time="2024-04-12T18:33:38.527968918Z" level=info msg="CreateContainer within sandbox \"7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1\"" Apr 12 18:33:38.528921 env[1336]: time="2024-04-12T18:33:38.528892735Z" level=info msg="StartContainer for \"4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1\"" Apr 12 18:33:38.536180 env[1336]: time="2024-04-12T18:33:38.531811601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-7076f33771,Uid:3c4216338621229228ecb0a07b12d357,Namespace:kube-system,Attempt:0,} returns sandbox id \"40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b\"" Apr 12 18:33:38.540518 env[1336]: time="2024-04-12T18:33:38.540477372Z" level=info msg="CreateContainer within sandbox \"40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:33:38.555601 systemd[1]: Started cri-containerd-4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1.scope. Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.570000 audit: BPF prog-id=77 op=LOAD Apr 12 18:33:38.571000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.571000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2149 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353937653933373264323237383264656634346133383064353165 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2149 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353937653933373264323237383264656634346133383064353165 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.572000 audit: BPF prog-id=78 op=LOAD Apr 12 18:33:38.572000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2149 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353937653933373264323237383264656634346133383064353165 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.573000 audit: BPF prog-id=79 op=LOAD Apr 12 18:33:38.573000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2149 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353937653933373264323237383264656634346133383064353165 Apr 12 18:33:38.574000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:33:38.574000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.574000 audit: BPF prog-id=80 op=LOAD Apr 12 18:33:38.574000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2149 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353937653933373264323237383264656634346133383064353165 Apr 12 18:33:38.582522 env[1336]: time="2024-04-12T18:33:38.582472958Z" level=info msg="CreateContainer within sandbox \"8ab879ac2c8cde9ff3b4a3f25faa6948edd03eb19e5936afd6ed173bb6c27a50\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"ec84b50ac6509e60d9267f57866b1d55065ef8538e4f9e126fd8f90331472cbc\"" Apr 12 18:33:38.583227 env[1336]: time="2024-04-12T18:33:38.583194965Z" level=info msg="StartContainer for \"ec84b50ac6509e60d9267f57866b1d55065ef8538e4f9e126fd8f90331472cbc\"" Apr 12 18:33:38.601513 env[1336]: time="2024-04-12T18:33:38.601462723Z" level=info msg="CreateContainer within sandbox \"40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3\"" Apr 12 18:33:38.605789 env[1336]: time="2024-04-12T18:33:38.605748856Z" level=info msg="StartContainer for \"acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3\"" Apr 12 18:33:38.606468 env[1336]: time="2024-04-12T18:33:38.606435389Z" level=info msg="StartContainer for \"4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1\" returns successfully" Apr 12 18:33:38.613493 systemd[1]: Started cri-containerd-ec84b50ac6509e60d9267f57866b1d55065ef8538e4f9e126fd8f90331472cbc.scope. Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.634000 audit: BPF prog-id=81 op=LOAD Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563383462353061633635303965363064393236376635373836366231 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563383462353061633635303965363064393236376635373836366231 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.635000 audit: BPF prog-id=82 op=LOAD Apr 12 18:33:38.635000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.635000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563383462353061633635303965363064393236376635373836366231 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit: BPF prog-id=83 op=LOAD Apr 12 18:33:38.636000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563383462353061633635303965363064393236376635373836366231 Apr 12 18:33:38.636000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:33:38.636000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.636000 audit: BPF prog-id=84 op=LOAD Apr 12 18:33:38.636000 audit[2309]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2184 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563383462353061633635303965363064393236376635373836366231 Apr 12 18:33:38.643640 systemd[1]: Started cri-containerd-acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3.scope. Apr 12 18:33:38.673662 env[1336]: time="2024-04-12T18:33:38.673599859Z" level=info msg="StartContainer for \"ec84b50ac6509e60d9267f57866b1d55065ef8538e4f9e126fd8f90331472cbc\" returns successfully" Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.675000 audit: BPF prog-id=85 op=LOAD Apr 12 18:33:38.676000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.676000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646236623233336266306366663232633238666532323730326139 Apr 12 18:33:38.676000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.676000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646236623233336266306366663232633238666532323730326139 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit: BPF prog-id=86 op=LOAD Apr 12 18:33:38.677000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646236623233336266306366663232633238666532323730326139 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.677000 audit: BPF prog-id=87 op=LOAD Apr 12 18:33:38.677000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646236623233336266306366663232633238666532323730326139 Apr 12 18:33:38.678000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:33:38.678000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:38.678000 audit: BPF prog-id=88 op=LOAD Apr 12 18:33:38.678000 audit[2336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2221 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163646236623233336266306366663232633238666532323730326139 Apr 12 18:33:38.721710 kubelet[2112]: E0412 18:33:38.721669 2112 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.27:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.27:6443: connect: connection refused Apr 12 18:33:38.730934 env[1336]: time="2024-04-12T18:33:38.730877346Z" level=info msg="StartContainer for \"acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3\" returns successfully" Apr 12 18:33:39.164022 systemd[1]: run-containerd-runc-k8s.io-7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97-runc.QGxvfL.mount: Deactivated successfully. Apr 12 18:33:39.798933 kubelet[2112]: I0412 18:33:39.798908 2112 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:40.794000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.794000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4007f2c660 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.794000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.803000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.803000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4007f2c750 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.838000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.838000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4005e72960 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.838000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.944000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.944000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4002c692a0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.944000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.944000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=400ad366c0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.944000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.947000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:40.947000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=400ad36930 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:33:40.947000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:40.994252 kubelet[2112]: E0412 18:33:40.994224 2112 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.3-a-7076f33771\" not found" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:41.108683 kubelet[2112]: I0412 18:33:41.108587 2112 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:41.173106 kubelet[2112]: E0412 18:33:41.172991 2112 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-7076f33771.17c59c0dda853af0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-7076f33771", UID:"ci-3510.3.3-a-7076f33771", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-7076f33771"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 599014128, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 599014128, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Apr 12 18:33:41.302668 kubelet[2112]: E0412 18:33:41.302570 2112 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-7076f33771.17c59c0ddc1865f6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-7076f33771", UID:"ci-3510.3.3-a-7076f33771", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-7076f33771"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 625436150, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 33, 36, 625436150, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Apr 12 18:33:41.602230 kubelet[2112]: I0412 18:33:41.602189 2112 apiserver.go:52] "Watching apiserver" Apr 12 18:33:41.613572 kubelet[2112]: I0412 18:33:41.613532 2112 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:33:41.649898 kubelet[2112]: I0412 18:33:41.649857 2112 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:33:42.041000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:42.048216 kernel: kauditd_printk_skb: 398 callbacks suppressed Apr 12 18:33:42.048307 kernel: audit: type=1400 audit(1712946822.041:684): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:42.041000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000870000 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:42.101160 kernel: audit: type=1300 audit(1712946822.041:684): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000870000 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:42.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:42.125691 kernel: audit: type=1327 audit(1712946822.041:684): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:42.125830 kernel: audit: type=1400 audit(1712946822.041:685): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:42.041000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:42.041000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000802040 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:42.174900 kernel: audit: type=1300 audit(1712946822.041:685): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000802040 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:42.175019 kernel: audit: type=1327 audit(1712946822.041:685): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:42.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:44.304270 systemd[1]: Reloading. Apr 12 18:33:44.361346 /usr/lib/systemd/system-generators/torcx-generator[2400]: time="2024-04-12T18:33:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:33:44.361372 /usr/lib/systemd/system-generators/torcx-generator[2400]: time="2024-04-12T18:33:44Z" level=info msg="torcx already run" Apr 12 18:33:44.451881 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:33:44.451900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:33:44.468610 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.581804 kernel: audit: type=1400 audit(1712946824.548:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.581935 kernel: audit: type=1400 audit(1712946824.548:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.600735 kernel: audit: type=1400 audit(1712946824.548:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601778 kernel: audit: type=1400 audit(1712946824.548:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit: BPF prog-id=89 op=LOAD Apr 12 18:33:44.565000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.581000 audit: BPF prog-id=90 op=LOAD Apr 12 18:33:44.581000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit: BPF prog-id=91 op=LOAD Apr 12 18:33:44.582000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.600000 audit: BPF prog-id=92 op=LOAD Apr 12 18:33:44.600000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.618000 audit: BPF prog-id=93 op=LOAD Apr 12 18:33:44.618000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.621000 audit: BPF prog-id=94 op=LOAD Apr 12 18:33:44.621000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.622000 audit: BPF prog-id=95 op=LOAD Apr 12 18:33:44.622000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.623000 audit: BPF prog-id=96 op=LOAD Apr 12 18:33:44.624000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit: BPF prog-id=97 op=LOAD Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit: BPF prog-id=98 op=LOAD Apr 12 18:33:44.625000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:33:44.625000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit: BPF prog-id=99 op=LOAD Apr 12 18:33:44.626000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit: BPF prog-id=100 op=LOAD Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.627000 audit: BPF prog-id=101 op=LOAD Apr 12 18:33:44.627000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:33:44.627000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.628000 audit: BPF prog-id=102 op=LOAD Apr 12 18:33:44.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.629000 audit: BPF prog-id=103 op=LOAD Apr 12 18:33:44.629000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:33:44.629000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.630000 audit: BPF prog-id=104 op=LOAD Apr 12 18:33:44.630000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit: BPF prog-id=105 op=LOAD Apr 12 18:33:44.632000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit: BPF prog-id=106 op=LOAD Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit: BPF prog-id=107 op=LOAD Apr 12 18:33:44.633000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:33:44.633000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit: BPF prog-id=108 op=LOAD Apr 12 18:33:44.634000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.635000 audit: BPF prog-id=109 op=LOAD Apr 12 18:33:44.635000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:33:44.656450 kubelet[2112]: I0412 18:33:44.656405 2112 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:33:44.659615 systemd[1]: Stopping kubelet.service... Apr 12 18:33:44.677701 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:33:44.678038 systemd[1]: Stopped kubelet.service. Apr 12 18:33:44.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:44.680822 systemd[1]: Started kubelet.service. Apr 12 18:33:44.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:44.750912 kubelet[2459]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:44.750912 kubelet[2459]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:33:44.750912 kubelet[2459]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:33:44.751268 kubelet[2459]: I0412 18:33:44.750960 2459 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:33:44.755215 kubelet[2459]: I0412 18:33:44.755181 2459 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:33:44.755215 kubelet[2459]: I0412 18:33:44.755211 2459 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:33:44.755522 kubelet[2459]: I0412 18:33:44.755502 2459 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:33:44.759576 kubelet[2459]: I0412 18:33:44.759550 2459 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:33:44.762101 kubelet[2459]: I0412 18:33:44.762078 2459 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:33:44.763350 kubelet[2459]: W0412 18:33:44.763334 2459 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:33:44.764011 kubelet[2459]: I0412 18:33:44.763995 2459 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:33:44.764255 kubelet[2459]: I0412 18:33:44.764244 2459 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:33:44.764421 kubelet[2459]: I0412 18:33:44.764408 2459 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:33:44.764667 kubelet[2459]: I0412 18:33:44.764651 2459 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:33:44.764759 kubelet[2459]: I0412 18:33:44.764750 2459 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:33:44.764837 kubelet[2459]: I0412 18:33:44.764828 2459 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:44.769691 kubelet[2459]: I0412 18:33:44.769668 2459 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:33:44.769850 kubelet[2459]: I0412 18:33:44.769839 2459 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:33:44.769976 kubelet[2459]: I0412 18:33:44.769954 2459 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:33:44.770066 kubelet[2459]: I0412 18:33:44.770057 2459 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:33:44.770617 kubelet[2459]: I0412 18:33:44.770591 2459 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:33:44.771272 kubelet[2459]: I0412 18:33:44.771239 2459 server.go:1168] "Started kubelet" Apr 12 18:33:44.772000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.772000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:44.772000 audit[2459]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400092b530 a1=40007f98f0 a2=400092b500 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.772000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:44.772000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.772000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:44.772000 audit[2459]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009186e0 a1=40007f9908 a2=400092b5c0 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.772000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:44.773572 kubelet[2459]: I0412 18:33:44.773272 2459 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:33:44.773572 kubelet[2459]: I0412 18:33:44.773334 2459 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:33:44.773572 kubelet[2459]: I0412 18:33:44.773366 2459 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:33:44.777738 kubelet[2459]: E0412 18:33:44.777719 2459 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:33:44.777857 kubelet[2459]: E0412 18:33:44.777846 2459 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:33:44.779602 kubelet[2459]: I0412 18:33:44.779587 2459 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:33:44.780235 kubelet[2459]: I0412 18:33:44.780220 2459 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:33:44.781280 kubelet[2459]: I0412 18:33:44.781263 2459 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:33:44.787514 kubelet[2459]: I0412 18:33:44.787484 2459 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:33:44.787968 kubelet[2459]: I0412 18:33:44.787943 2459 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:33:44.818387 kubelet[2459]: I0412 18:33:44.818356 2459 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:33:44.819120 kubelet[2459]: I0412 18:33:44.819095 2459 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:33:44.819152 kubelet[2459]: I0412 18:33:44.819129 2459 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:33:44.819152 kubelet[2459]: I0412 18:33:44.819148 2459 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:33:44.819211 kubelet[2459]: E0412 18:33:44.819197 2459 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:33:44.902797 kubelet[2459]: I0412 18:33:44.898732 2459 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:44.920416 kubelet[2459]: E0412 18:33:44.920364 2459 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931634 2459 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931657 2459 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931676 2459 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931830 2459 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931843 2459 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 18:33:44.933317 kubelet[2459]: I0412 18:33:44.931850 2459 policy_none.go:49] "None policy: Start" Apr 12 18:33:44.934268 kubelet[2459]: I0412 18:33:44.934249 2459 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:33:44.934408 kubelet[2459]: I0412 18:33:44.934397 2459 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:33:44.934618 kubelet[2459]: I0412 18:33:44.934606 2459 state_mem.go:75] "Updated machine memory state" Apr 12 18:33:44.937986 kubelet[2459]: I0412 18:33:44.937965 2459 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:33:44.937000 audit[2459]: AVC avc: denied { mac_admin } for pid=2459 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.937000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:33:44.937000 audit[2459]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d61f50 a1=4000eab5f0 a2=4000d61f20 a3=25 items=0 ppid=1 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.937000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:33:44.941467 kubelet[2459]: I0412 18:33:44.941441 2459 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:33:44.941758 kubelet[2459]: I0412 18:33:44.941745 2459 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:33:44.959244 kubelet[2459]: I0412 18:33:44.959215 2459 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:44.959521 kubelet[2459]: I0412 18:33:44.959496 2459 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.120718 kubelet[2459]: I0412 18:33:45.120674 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:45.120958 kubelet[2459]: I0412 18:33:45.120945 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:45.121111 kubelet[2459]: I0412 18:33:45.121098 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:33:45.130673 kubelet[2459]: W0412 18:33:45.130648 2459 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:33:45.131324 kubelet[2459]: W0412 18:33:45.131291 2459 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:33:45.137151 kubelet[2459]: W0412 18:33:45.137103 2459 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:33:45.197564 kubelet[2459]: I0412 18:33:45.197526 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3c4216338621229228ecb0a07b12d357-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-7076f33771\" (UID: \"3c4216338621229228ecb0a07b12d357\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197732 kubelet[2459]: I0412 18:33:45.197587 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197732 kubelet[2459]: I0412 18:33:45.197608 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197732 kubelet[2459]: I0412 18:33:45.197628 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197732 kubelet[2459]: I0412 18:33:45.197649 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197732 kubelet[2459]: I0412 18:33:45.197670 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197854 kubelet[2459]: I0412 18:33:45.197695 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/19016fb7f3ef51ac3333389b6704fc3b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-7076f33771\" (UID: \"19016fb7f3ef51ac3333389b6704fc3b\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197854 kubelet[2459]: I0412 18:33:45.197722 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.197854 kubelet[2459]: I0412 18:33:45.197741 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d0cea62f035e55be6481ea9677b85ae-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-7076f33771\" (UID: \"8d0cea62f035e55be6481ea9677b85ae\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" Apr 12 18:33:45.776540 kubelet[2459]: I0412 18:33:45.776501 2459 apiserver.go:52] "Watching apiserver" Apr 12 18:33:45.789000 kubelet[2459]: I0412 18:33:45.788955 2459 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:33:45.801363 kubelet[2459]: I0412 18:33:45.801329 2459 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:33:45.970468 kubelet[2459]: I0412 18:33:45.970426 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-7076f33771" podStartSLOduration=0.970383749 podCreationTimestamp="2024-04-12 18:33:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:45.955664283 +0000 UTC m=+1.272391402" watchObservedRunningTime="2024-04-12 18:33:45.970383749 +0000 UTC m=+1.287110868" Apr 12 18:33:46.001931 kubelet[2459]: I0412 18:33:46.001881 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-7076f33771" podStartSLOduration=1.001841411 podCreationTimestamp="2024-04-12 18:33:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:46.001638157 +0000 UTC m=+1.318365316" watchObservedRunningTime="2024-04-12 18:33:46.001841411 +0000 UTC m=+1.318568530" Apr 12 18:33:46.002074 kubelet[2459]: I0412 18:33:46.002013 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-7076f33771" podStartSLOduration=1.00199687 podCreationTimestamp="2024-04-12 18:33:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:45.970736382 +0000 UTC m=+1.287463501" watchObservedRunningTime="2024-04-12 18:33:46.00199687 +0000 UTC m=+1.318724029" Apr 12 18:33:48.225562 sudo[1700]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:48.224000 audit[1700]: USER_END pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.230595 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 18:33:48.230675 kernel: audit: type=1106 audit(1712946828.224:935): pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.229000 audit[1700]: CRED_DISP pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.272381 kernel: audit: type=1104 audit(1712946828.229:936): pid=1700 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.316639 sshd[1697]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:48.316000 audit[1697]: USER_END pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:48.316000 audit[1697]: CRED_DISP pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:48.343382 systemd[1]: sshd@6-10.200.20.27:22-10.200.12.6:34692.service: Deactivated successfully. Apr 12 18:33:48.344195 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:33:48.344376 systemd[1]: session-9.scope: Consumed 7.082s CPU time. Apr 12 18:33:48.364332 kernel: audit: type=1106 audit(1712946828.316:937): pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:48.364468 kernel: audit: type=1104 audit(1712946828.316:938): pid=1697 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:48.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.27:22-10.200.12.6:34692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.388155 kernel: audit: type=1131 audit(1712946828.342:939): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.27:22-10.200.12.6:34692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:48.388540 systemd-logind[1325]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:33:48.389586 systemd-logind[1325]: Removed session 9. Apr 12 18:33:57.100000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.100000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000891c00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.152731 kernel: audit: type=1400 audit(1712946837.100:940): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.152897 kernel: audit: type=1300 audit(1712946837.100:940): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000891c00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.152928 kernel: audit: type=1327 audit(1712946837.100:940): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.105000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.199213 kernel: audit: type=1400 audit(1712946837.105:941): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.199409 kernel: audit: type=1300 audit(1712946837.105:941): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000803ec0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.105000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000803ec0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.105000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.252901 kernel: audit: type=1327 audit(1712946837.105:941): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.106000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.275657 kernel: audit: type=1400 audit(1712946837.106:942): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.106000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000891dc0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.304843 kernel: audit: type=1300 audit(1712946837.106:942): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000891dc0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.305323 kernel: audit: type=1327 audit(1712946837.106:942): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:57.106000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.350933 kernel: audit: type=1400 audit(1712946837.106:943): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:57.106000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400095e080 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:57.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:59.099000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:33:59.099000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c94880 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:33:59.099000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:59.713836 kubelet[2459]: I0412 18:33:59.713798 2459 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:33:59.714715 env[1336]: time="2024-04-12T18:33:59.714590045Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:33:59.715377 kubelet[2459]: I0412 18:33:59.715357 2459 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:34:00.371968 kubelet[2459]: I0412 18:34:00.371934 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:00.377684 systemd[1]: Created slice kubepods-besteffort-poda3406099_5044_4c1e_a7b9_eff26c738151.slice. Apr 12 18:34:00.521351 kubelet[2459]: I0412 18:34:00.521319 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a3406099-5044-4c1e-a7b9-eff26c738151-kube-proxy\") pod \"kube-proxy-8pjbm\" (UID: \"a3406099-5044-4c1e-a7b9-eff26c738151\") " pod="kube-system/kube-proxy-8pjbm" Apr 12 18:34:00.521619 kubelet[2459]: I0412 18:34:00.521584 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a3406099-5044-4c1e-a7b9-eff26c738151-xtables-lock\") pod \"kube-proxy-8pjbm\" (UID: \"a3406099-5044-4c1e-a7b9-eff26c738151\") " pod="kube-system/kube-proxy-8pjbm" Apr 12 18:34:00.521734 kubelet[2459]: I0412 18:34:00.521725 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a3406099-5044-4c1e-a7b9-eff26c738151-lib-modules\") pod \"kube-proxy-8pjbm\" (UID: \"a3406099-5044-4c1e-a7b9-eff26c738151\") " pod="kube-system/kube-proxy-8pjbm" Apr 12 18:34:00.521846 kubelet[2459]: I0412 18:34:00.521836 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6hp4t\" (UniqueName: \"kubernetes.io/projected/a3406099-5044-4c1e-a7b9-eff26c738151-kube-api-access-6hp4t\") pod \"kube-proxy-8pjbm\" (UID: \"a3406099-5044-4c1e-a7b9-eff26c738151\") " pod="kube-system/kube-proxy-8pjbm" Apr 12 18:34:00.686895 kubelet[2459]: I0412 18:34:00.686781 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:00.687866 env[1336]: time="2024-04-12T18:34:00.687424718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8pjbm,Uid:a3406099-5044-4c1e-a7b9-eff26c738151,Namespace:kube-system,Attempt:0,}" Apr 12 18:34:00.692646 systemd[1]: Created slice kubepods-besteffort-pod10435cd0_bc98_4b49_8ce9_e6fc103240f2.slice. Apr 12 18:34:00.695034 kubelet[2459]: W0412 18:34:00.694996 2459 reflector.go:533] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.3-a-7076f33771" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.3-a-7076f33771' and this object Apr 12 18:34:00.695034 kubelet[2459]: E0412 18:34:00.695033 2459 reflector.go:148] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.3-a-7076f33771" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.3-a-7076f33771' and this object Apr 12 18:34:00.732389 env[1336]: time="2024-04-12T18:34:00.732329241Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:00.732740 env[1336]: time="2024-04-12T18:34:00.732715362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:00.732846 env[1336]: time="2024-04-12T18:34:00.732825791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:00.733087 env[1336]: time="2024-04-12T18:34:00.733058127Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7aac008bc065d6d1dfe59df9745d92aee5f12ab05a798c721b00d5819d044b93 pid=2538 runtime=io.containerd.runc.v2 Apr 12 18:34:00.747490 systemd[1]: Started cri-containerd-7aac008bc065d6d1dfe59df9745d92aee5f12ab05a798c721b00d5819d044b93.scope. Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.762000 audit: BPF prog-id=110 op=LOAD Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2538 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761616330303862633036356436643164666535396466393734356439 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2538 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761616330303862633036356436643164666535396466393734356439 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.763000 audit: BPF prog-id=111 op=LOAD Apr 12 18:34:00.763000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2538 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761616330303862633036356436643164666535396466393734356439 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit: BPF prog-id=112 op=LOAD Apr 12 18:34:00.764000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2538 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761616330303862633036356436643164666535396466393734356439 Apr 12 18:34:00.764000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:34:00.764000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.764000 audit: BPF prog-id=113 op=LOAD Apr 12 18:34:00.764000 audit[2547]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2538 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761616330303862633036356436643164666535396466393734356439 Apr 12 18:34:00.780835 env[1336]: time="2024-04-12T18:34:00.780775846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8pjbm,Uid:a3406099-5044-4c1e-a7b9-eff26c738151,Namespace:kube-system,Attempt:0,} returns sandbox id \"7aac008bc065d6d1dfe59df9745d92aee5f12ab05a798c721b00d5819d044b93\"" Apr 12 18:34:00.784639 env[1336]: time="2024-04-12T18:34:00.784597618Z" level=info msg="CreateContainer within sandbox \"7aac008bc065d6d1dfe59df9745d92aee5f12ab05a798c721b00d5819d044b93\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:34:00.824707 kubelet[2459]: I0412 18:34:00.824556 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/10435cd0-bc98-4b49-8ce9-e6fc103240f2-var-lib-calico\") pod \"tigera-operator-786dc9d695-m4jwc\" (UID: \"10435cd0-bc98-4b49-8ce9-e6fc103240f2\") " pod="tigera-operator/tigera-operator-786dc9d695-m4jwc" Apr 12 18:34:00.824707 kubelet[2459]: I0412 18:34:00.824624 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sxl96\" (UniqueName: \"kubernetes.io/projected/10435cd0-bc98-4b49-8ce9-e6fc103240f2-kube-api-access-sxl96\") pod \"tigera-operator-786dc9d695-m4jwc\" (UID: \"10435cd0-bc98-4b49-8ce9-e6fc103240f2\") " pod="tigera-operator/tigera-operator-786dc9d695-m4jwc" Apr 12 18:34:00.835428 env[1336]: time="2024-04-12T18:34:00.835382385Z" level=info msg="CreateContainer within sandbox \"7aac008bc065d6d1dfe59df9745d92aee5f12ab05a798c721b00d5819d044b93\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4c79f434e484a44abef638cf836d6b46414afc8d9abd51caf0b3e1e06361c3c9\"" Apr 12 18:34:00.836987 env[1336]: time="2024-04-12T18:34:00.836334128Z" level=info msg="StartContainer for \"4c79f434e484a44abef638cf836d6b46414afc8d9abd51caf0b3e1e06361c3c9\"" Apr 12 18:34:00.854635 systemd[1]: Started cri-containerd-4c79f434e484a44abef638cf836d6b46414afc8d9abd51caf0b3e1e06361c3c9.scope. Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2538 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373966343334653438346134346162656636333863663833366436 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.871000 audit: BPF prog-id=114 op=LOAD Apr 12 18:34:00.871000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2538 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373966343334653438346134346162656636333863663833366436 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.872000 audit: BPF prog-id=115 op=LOAD Apr 12 18:34:00.872000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2538 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373966343334653438346134346162656636333863663833366436 Apr 12 18:34:00.872000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:34:00.872000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:00.873000 audit: BPF prog-id=116 op=LOAD Apr 12 18:34:00.873000 audit[2580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2538 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373966343334653438346134346162656636333863663833366436 Apr 12 18:34:00.891787 env[1336]: time="2024-04-12T18:34:00.891723388Z" level=info msg="StartContainer for \"4c79f434e484a44abef638cf836d6b46414afc8d9abd51caf0b3e1e06361c3c9\" returns successfully" Apr 12 18:34:00.964000 audit[2630]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:00.964000 audit[2630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef8177e0 a2=0 a3=1 items=0 ppid=2590 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:34:00.965000 audit[2631]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:00.965000 audit[2631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb3f0a40 a2=0 a3=1 items=0 ppid=2590 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:34:00.967000 audit[2632]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:00.967000 audit[2632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc3f5550 a2=0 a3=1 items=0 ppid=2590 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:34:00.970000 audit[2633]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:00.970000 audit[2633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff52f11a0 a2=0 a3=1 items=0 ppid=2590 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:34:00.971000 audit[2634]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:00.971000 audit[2634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe425f5b0 a2=0 a3=1 items=0 ppid=2590 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:34:00.974000 audit[2635]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:00.974000 audit[2635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9a692c0 a2=0 a3=1 items=0 ppid=2590 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:00.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:34:00.997196 env[1336]: time="2024-04-12T18:34:00.997158489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-m4jwc,Uid:10435cd0-bc98-4b49-8ce9-e6fc103240f2,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:34:01.039871 env[1336]: time="2024-04-12T18:34:01.039798229Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:01.040049 env[1336]: time="2024-04-12T18:34:01.039842144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:01.040049 env[1336]: time="2024-04-12T18:34:01.039852543Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:01.040049 env[1336]: time="2024-04-12T18:34:01.040022326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2 pid=2642 runtime=io.containerd.runc.v2 Apr 12 18:34:01.052348 systemd[1]: Started cri-containerd-4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2.scope. Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.065000 audit: BPF prog-id=117 op=LOAD Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2642 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663237623363666134356533386331633662386466346565353633 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2642 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663237623363666134356533386331633662386466346565353633 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.066000 audit: BPF prog-id=118 op=LOAD Apr 12 18:34:01.066000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2642 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663237623363666134356533386331633662386466346565353633 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit: BPF prog-id=119 op=LOAD Apr 12 18:34:01.067000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2642 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663237623363666134356533386331633662386466346565353633 Apr 12 18:34:01.067000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:34:01.067000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:01.067000 audit: BPF prog-id=120 op=LOAD Apr 12 18:34:01.067000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2642 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663237623363666134356533386331633662386466346565353633 Apr 12 18:34:01.069000 audit[2671]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.069000 audit[2671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff471e0f0 a2=0 a3=1 items=0 ppid=2590 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:34:01.072000 audit[2673]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.072000 audit[2673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffbb10210 a2=0 a3=1 items=0 ppid=2590 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:34:01.080000 audit[2676]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.080000 audit[2676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcad4c8d0 a2=0 a3=1 items=0 ppid=2590 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:34:01.082000 audit[2678]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.082000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee3e7220 a2=0 a3=1 items=0 ppid=2590 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:34:01.085000 audit[2685]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.085000 audit[2685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd3750a40 a2=0 a3=1 items=0 ppid=2590 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:34:01.086000 audit[2686]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.086000 audit[2686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff10bce90 a2=0 a3=1 items=0 ppid=2590 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:34:01.088660 env[1336]: time="2024-04-12T18:34:01.088615757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-m4jwc,Uid:10435cd0-bc98-4b49-8ce9-e6fc103240f2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2\"" Apr 12 18:34:01.089000 audit[2688]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.089000 audit[2688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe83b18c0 a2=0 a3=1 items=0 ppid=2590 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:34:01.095527 env[1336]: time="2024-04-12T18:34:01.093012158Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:34:01.098000 audit[2691]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.098000 audit[2691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffed42b330 a2=0 a3=1 items=0 ppid=2590 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:34:01.099000 audit[2692]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.099000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffca700f0 a2=0 a3=1 items=0 ppid=2590 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:34:01.102000 audit[2694]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.102000 audit[2694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9271200 a2=0 a3=1 items=0 ppid=2590 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:34:01.103000 audit[2695]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.103000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3a85a10 a2=0 a3=1 items=0 ppid=2590 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:34:01.106000 audit[2697]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.106000 audit[2697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb45c180 a2=0 a3=1 items=0 ppid=2590 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:34:01.109000 audit[2700]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.109000 audit[2700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff998dbe0 a2=0 a3=1 items=0 ppid=2590 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:34:01.112000 audit[2703]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.112000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7fca460 a2=0 a3=1 items=0 ppid=2590 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:34:01.114000 audit[2704]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.114000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd02be320 a2=0 a3=1 items=0 ppid=2590 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:34:01.116000 audit[2706]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.116000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdc57cbc0 a2=0 a3=1 items=0 ppid=2590 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:34:01.119000 audit[2709]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.119000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe4b4400 a2=0 a3=1 items=0 ppid=2590 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:34:01.124000 audit[2714]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.124000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde1bae00 a2=0 a3=1 items=0 ppid=2590 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:34:01.127000 audit[2716]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:34:01.127000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe17bbc70 a2=0 a3=1 items=0 ppid=2590 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:34:01.163000 audit[2718]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.163000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff94ce7d0 a2=0 a3=1 items=0 ppid=2590 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.557000 audit[2718]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.557000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff94ce7d0 a2=0 a3=1 items=0 ppid=2590 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.558000 audit[2723]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.558000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff0e48780 a2=0 a3=1 items=0 ppid=2590 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:34:01.560000 audit[2725]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.560000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff0b79760 a2=0 a3=1 items=0 ppid=2590 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:34:01.564000 audit[2728]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.564000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffda401500 a2=0 a3=1 items=0 ppid=2590 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:34:01.565000 audit[2729]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.565000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe33fe8b0 a2=0 a3=1 items=0 ppid=2590 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:34:01.567000 audit[2731]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.567000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffda724e00 a2=0 a3=1 items=0 ppid=2590 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:34:01.570000 audit[2732]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.570000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff35831a0 a2=0 a3=1 items=0 ppid=2590 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:34:01.573000 audit[2734]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.573000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe962cf30 a2=0 a3=1 items=0 ppid=2590 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:34:01.577000 audit[2737]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.577000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff71fe060 a2=0 a3=1 items=0 ppid=2590 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:34:01.578000 audit[2738]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.578000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd97f93c0 a2=0 a3=1 items=0 ppid=2590 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:34:01.580000 audit[2740]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.580000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdcb63760 a2=0 a3=1 items=0 ppid=2590 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:34:01.581000 audit[2741]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.581000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd14ca780 a2=0 a3=1 items=0 ppid=2590 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:34:01.583000 audit[2743]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.583000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd02743a0 a2=0 a3=1 items=0 ppid=2590 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:34:01.586000 audit[2746]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.586000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6000620 a2=0 a3=1 items=0 ppid=2590 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:34:01.590000 audit[2749]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.590000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffebe70240 a2=0 a3=1 items=0 ppid=2590 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:34:01.591000 audit[2750]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.591000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdfebd980 a2=0 a3=1 items=0 ppid=2590 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:34:01.594000 audit[2752]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.594000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe15987f0 a2=0 a3=1 items=0 ppid=2590 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:34:01.597000 audit[2755]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.597000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff27b06c0 a2=0 a3=1 items=0 ppid=2590 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:34:01.598000 audit[2756]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.598000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1fa0990 a2=0 a3=1 items=0 ppid=2590 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:34:01.600000 audit[2758]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.600000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf063eb0 a2=0 a3=1 items=0 ppid=2590 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:34:01.603000 audit[2761]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.603000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc4bde410 a2=0 a3=1 items=0 ppid=2590 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:34:01.604000 audit[2762]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.604000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8bea190 a2=0 a3=1 items=0 ppid=2590 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:34:01.606000 audit[2764]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:34:01.606000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffff7be700 a2=0 a3=1 items=0 ppid=2590 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:34:01.609000 audit[2766]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:34:01.609000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe872c680 a2=0 a3=1 items=0 ppid=2590 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.609000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.609000 audit[2766]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:34:01.609000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe872c680 a2=0 a3=1 items=0 ppid=2590 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.609000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.636630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4253219556.mount: Deactivated successfully. Apr 12 18:34:02.685662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount969254215.mount: Deactivated successfully. Apr 12 18:34:03.429905 env[1336]: time="2024-04-12T18:34:03.429856300Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:03.435778 env[1336]: time="2024-04-12T18:34:03.435735532Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:03.440703 env[1336]: time="2024-04-12T18:34:03.440660336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:03.447223 env[1336]: time="2024-04-12T18:34:03.447183706Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:03.448161 env[1336]: time="2024-04-12T18:34:03.448128815Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:34:03.452193 env[1336]: time="2024-04-12T18:34:03.452132388Z" level=info msg="CreateContainer within sandbox \"4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:34:03.480588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount303936168.mount: Deactivated successfully. Apr 12 18:34:03.499670 env[1336]: time="2024-04-12T18:34:03.499612081Z" level=info msg="CreateContainer within sandbox \"4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0\"" Apr 12 18:34:03.502175 env[1336]: time="2024-04-12T18:34:03.501473421Z" level=info msg="StartContainer for \"fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0\"" Apr 12 18:34:03.517130 systemd[1]: Started cri-containerd-fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0.scope. Apr 12 18:34:03.539333 kernel: kauditd_printk_skb: 315 callbacks suppressed Apr 12 18:34:03.539460 kernel: audit: type=1400 audit(1712946843.531:1038): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.572579 kernel: audit: type=1400 audit(1712946843.531:1039): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.591108 kernel: audit: type=1400 audit(1712946843.531:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.608991 kernel: audit: type=1400 audit(1712946843.531:1041): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.627033 kernel: audit: type=1400 audit(1712946843.531:1042): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.647025 kernel: audit: type=1400 audit(1712946843.531:1043): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.667784 kernel: audit: type=1400 audit(1712946843.531:1044): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.686241 kernel: audit: type=1400 audit(1712946843.531:1045): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.708128 kernel: audit: type=1400 audit(1712946843.531:1046): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.708472 env[1336]: time="2024-04-12T18:34:03.708420509Z" level=info msg="StartContainer for \"fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0\" returns successfully" Apr 12 18:34:03.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.728549 kernel: audit: type=1400 audit(1712946843.536:1047): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.536000 audit: BPF prog-id=121 op=LOAD Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2642 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356333303332666261356331643635383361316162393934656162 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2642 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356333303332666261356331643635383361316162393934656162 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit: BPF prog-id=122 op=LOAD Apr 12 18:34:03.554000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2642 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356333303332666261356331643635383361316162393934656162 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit: BPF prog-id=123 op=LOAD Apr 12 18:34:03.554000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2642 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356333303332666261356331643635383361316162393934656162 Apr 12 18:34:03.554000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:34:03.554000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { perfmon } for pid=2775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit[2775]: AVC avc: denied { bpf } for pid=2775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:03.554000 audit: BPF prog-id=124 op=LOAD Apr 12 18:34:03.554000 audit[2775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2642 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662356333303332666261356331643635383361316162393934656162 Apr 12 18:34:03.933319 kubelet[2459]: I0412 18:34:03.933263 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-8pjbm" podStartSLOduration=3.933219873 podCreationTimestamp="2024-04-12 18:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:34:00.938393812 +0000 UTC m=+16.255120971" watchObservedRunningTime="2024-04-12 18:34:03.933219873 +0000 UTC m=+19.249947032" Apr 12 18:34:04.829497 kubelet[2459]: I0412 18:34:04.829444 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-m4jwc" podStartSLOduration=2.472064198 podCreationTimestamp="2024-04-12 18:34:00 +0000 UTC" firstStartedPulling="2024-04-12 18:34:01.09198862 +0000 UTC m=+16.408715779" lastFinishedPulling="2024-04-12 18:34:03.449326059 +0000 UTC m=+18.766053218" observedRunningTime="2024-04-12 18:34:03.934173901 +0000 UTC m=+19.250901060" watchObservedRunningTime="2024-04-12 18:34:04.829401637 +0000 UTC m=+20.146128796" Apr 12 18:34:06.671000 audit[2805]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:06.671000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcb9f72c0 a2=0 a3=1 items=0 ppid=2590 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:06.672000 audit[2805]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:06.672000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcb9f72c0 a2=0 a3=1 items=0 ppid=2590 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:06.683000 audit[2807]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:06.683000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd94c5930 a2=0 a3=1 items=0 ppid=2590 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:06.684000 audit[2807]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:06.684000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd94c5930 a2=0 a3=1 items=0 ppid=2590 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:06.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:06.816037 kubelet[2459]: I0412 18:34:06.816002 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:06.821615 systemd[1]: Created slice kubepods-besteffort-podf206d5ed_4e7a_4430_83a0_fbc62a6d9eec.slice. Apr 12 18:34:06.865870 kubelet[2459]: I0412 18:34:06.865832 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f206d5ed-4e7a-4430-83a0-fbc62a6d9eec-typha-certs\") pod \"calico-typha-5896b55b79-bnpj5\" (UID: \"f206d5ed-4e7a-4430-83a0-fbc62a6d9eec\") " pod="calico-system/calico-typha-5896b55b79-bnpj5" Apr 12 18:34:06.866072 kubelet[2459]: I0412 18:34:06.866059 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckl4p\" (UniqueName: \"kubernetes.io/projected/f206d5ed-4e7a-4430-83a0-fbc62a6d9eec-kube-api-access-ckl4p\") pod \"calico-typha-5896b55b79-bnpj5\" (UID: \"f206d5ed-4e7a-4430-83a0-fbc62a6d9eec\") " pod="calico-system/calico-typha-5896b55b79-bnpj5" Apr 12 18:34:06.866211 kubelet[2459]: I0412 18:34:06.866197 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f206d5ed-4e7a-4430-83a0-fbc62a6d9eec-tigera-ca-bundle\") pod \"calico-typha-5896b55b79-bnpj5\" (UID: \"f206d5ed-4e7a-4430-83a0-fbc62a6d9eec\") " pod="calico-system/calico-typha-5896b55b79-bnpj5" Apr 12 18:34:06.933283 kubelet[2459]: I0412 18:34:06.933173 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:06.939379 systemd[1]: Created slice kubepods-besteffort-pod2d74a770_c3eb_4d33_b194_0e176d188427.slice. Apr 12 18:34:07.059451 kubelet[2459]: I0412 18:34:07.059393 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:07.060048 kubelet[2459]: E0412 18:34:07.060015 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:07.066930 kubelet[2459]: I0412 18:34:07.066845 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-var-lib-calico\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.066930 kubelet[2459]: I0412 18:34:07.066931 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-cni-log-dir\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067187 kubelet[2459]: I0412 18:34:07.066954 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lzmh\" (UniqueName: \"kubernetes.io/projected/2d74a770-c3eb-4d33-b194-0e176d188427-kube-api-access-8lzmh\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067215 kubelet[2459]: I0412 18:34:07.067188 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-cni-bin-dir\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067377 kubelet[2459]: I0412 18:34:07.067335 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2d74a770-c3eb-4d33-b194-0e176d188427-tigera-ca-bundle\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067455 kubelet[2459]: I0412 18:34:07.067437 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-cni-net-dir\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067539 kubelet[2459]: I0412 18:34:07.067495 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-var-run-calico\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067579 kubelet[2459]: I0412 18:34:07.067568 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-xtables-lock\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067604 kubelet[2459]: I0412 18:34:07.067590 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-flexvol-driver-host\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067691 kubelet[2459]: I0412 18:34:07.067675 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-lib-modules\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067790 kubelet[2459]: I0412 18:34:07.067735 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2d74a770-c3eb-4d33-b194-0e176d188427-policysync\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.067823 kubelet[2459]: I0412 18:34:07.067814 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2d74a770-c3eb-4d33-b194-0e176d188427-node-certs\") pod \"calico-node-skk8r\" (UID: \"2d74a770-c3eb-4d33-b194-0e176d188427\") " pod="calico-system/calico-node-skk8r" Apr 12 18:34:07.132079 env[1336]: time="2024-04-12T18:34:07.131647864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5896b55b79-bnpj5,Uid:f206d5ed-4e7a-4430-83a0-fbc62a6d9eec,Namespace:calico-system,Attempt:0,}" Apr 12 18:34:07.169140 kubelet[2459]: I0412 18:34:07.169051 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4aa58e7f-5556-4245-abd0-59216f6bf8aa-kubelet-dir\") pod \"csi-node-driver-5zv96\" (UID: \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\") " pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:07.169140 kubelet[2459]: I0412 18:34:07.169135 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4aa58e7f-5556-4245-abd0-59216f6bf8aa-socket-dir\") pod \"csi-node-driver-5zv96\" (UID: \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\") " pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:07.169400 kubelet[2459]: I0412 18:34:07.169267 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4aa58e7f-5556-4245-abd0-59216f6bf8aa-varrun\") pod \"csi-node-driver-5zv96\" (UID: \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\") " pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:07.169400 kubelet[2459]: I0412 18:34:07.169382 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4aa58e7f-5556-4245-abd0-59216f6bf8aa-registration-dir\") pod \"csi-node-driver-5zv96\" (UID: \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\") " pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:07.169491 kubelet[2459]: I0412 18:34:07.169406 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zhntd\" (UniqueName: \"kubernetes.io/projected/4aa58e7f-5556-4245-abd0-59216f6bf8aa-kube-api-access-zhntd\") pod \"csi-node-driver-5zv96\" (UID: \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\") " pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:07.171453 kubelet[2459]: E0412 18:34:07.171422 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.171453 kubelet[2459]: W0412 18:34:07.171446 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.171453 kubelet[2459]: E0412 18:34:07.171480 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.171676 kubelet[2459]: E0412 18:34:07.171670 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.171743 kubelet[2459]: W0412 18:34:07.171677 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.171743 kubelet[2459]: E0412 18:34:07.171726 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.171886 kubelet[2459]: E0412 18:34:07.171863 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.171886 kubelet[2459]: W0412 18:34:07.171877 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.171886 kubelet[2459]: E0412 18:34:07.171887 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.174559 kubelet[2459]: E0412 18:34:07.174519 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.174559 kubelet[2459]: W0412 18:34:07.174549 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.174559 kubelet[2459]: E0412 18:34:07.174606 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.198188 env[1336]: time="2024-04-12T18:34:07.198072553Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:07.198467 env[1336]: time="2024-04-12T18:34:07.198195942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:07.198467 env[1336]: time="2024-04-12T18:34:07.198236818Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:07.198567 env[1336]: time="2024-04-12T18:34:07.198546030Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc5164815853a659da234f0658ef959ca7db0721c84f641f2ddfbe476ffebd0d pid=2822 runtime=io.containerd.runc.v2 Apr 12 18:34:07.199367 kubelet[2459]: E0412 18:34:07.199282 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.199515 kubelet[2459]: W0412 18:34:07.199498 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.199621 kubelet[2459]: E0412 18:34:07.199588 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.201680 kubelet[2459]: E0412 18:34:07.201660 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.201804 kubelet[2459]: W0412 18:34:07.201789 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.201921 kubelet[2459]: E0412 18:34:07.201910 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.202338 kubelet[2459]: E0412 18:34:07.202272 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.202453 kubelet[2459]: W0412 18:34:07.202412 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.202516 kubelet[2459]: E0412 18:34:07.202506 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.202848 kubelet[2459]: E0412 18:34:07.202837 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.202950 kubelet[2459]: W0412 18:34:07.202938 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.203053 kubelet[2459]: E0412 18:34:07.203035 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.203337 kubelet[2459]: E0412 18:34:07.203326 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.203448 kubelet[2459]: W0412 18:34:07.203437 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.203533 kubelet[2459]: E0412 18:34:07.203511 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.203843 kubelet[2459]: E0412 18:34:07.203832 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.203969 kubelet[2459]: W0412 18:34:07.203956 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.210968 kubelet[2459]: E0412 18:34:07.210938 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.211523 kubelet[2459]: E0412 18:34:07.211478 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.211640 kubelet[2459]: W0412 18:34:07.211603 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.211699 kubelet[2459]: E0412 18:34:07.211690 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.212137 kubelet[2459]: E0412 18:34:07.212125 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.212250 kubelet[2459]: W0412 18:34:07.212238 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.212389 kubelet[2459]: E0412 18:34:07.212378 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.214723 kubelet[2459]: E0412 18:34:07.214668 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.215114 kubelet[2459]: W0412 18:34:07.215097 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.215228 kubelet[2459]: E0412 18:34:07.215218 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.216240 kubelet[2459]: E0412 18:34:07.215981 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.216441 kubelet[2459]: W0412 18:34:07.216388 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.216712 kubelet[2459]: E0412 18:34:07.216698 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.219287 kubelet[2459]: E0412 18:34:07.219269 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.219478 kubelet[2459]: W0412 18:34:07.219462 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.220356 kubelet[2459]: E0412 18:34:07.219585 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.220636 systemd[1]: Started cri-containerd-fc5164815853a659da234f0658ef959ca7db0721c84f641f2ddfbe476ffebd0d.scope. Apr 12 18:34:07.225654 kubelet[2459]: E0412 18:34:07.225595 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.225804 kubelet[2459]: W0412 18:34:07.225789 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.225922 kubelet[2459]: E0412 18:34:07.225912 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.242075 kubelet[2459]: E0412 18:34:07.242046 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.242318 kubelet[2459]: W0412 18:34:07.242257 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.242799 kubelet[2459]: E0412 18:34:07.242776 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.244220 kubelet[2459]: E0412 18:34:07.244191 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.244340 kubelet[2459]: W0412 18:34:07.244215 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.244340 kubelet[2459]: E0412 18:34:07.244323 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.244859 kubelet[2459]: E0412 18:34:07.244837 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.244859 kubelet[2459]: W0412 18:34:07.244854 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.245042 kubelet[2459]: E0412 18:34:07.245026 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.245515 kubelet[2459]: E0412 18:34:07.245492 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.245515 kubelet[2459]: W0412 18:34:07.245510 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.245729 kubelet[2459]: E0412 18:34:07.245706 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.245845 kubelet[2459]: E0412 18:34:07.245754 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.245901 kubelet[2459]: W0412 18:34:07.245888 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.246067 kubelet[2459]: E0412 18:34:07.246005 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.249359 kubelet[2459]: E0412 18:34:07.249267 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.249728 kubelet[2459]: W0412 18:34:07.249706 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.250056 kubelet[2459]: E0412 18:34:07.249990 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.251597 kubelet[2459]: E0412 18:34:07.250835 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.253995 kubelet[2459]: W0412 18:34:07.253961 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.254238 kubelet[2459]: E0412 18:34:07.254207 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.254729 kubelet[2459]: E0412 18:34:07.254706 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.254882 kubelet[2459]: W0412 18:34:07.254868 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.255027 kubelet[2459]: E0412 18:34:07.255000 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.256990 kubelet[2459]: E0412 18:34:07.256964 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.257183 kubelet[2459]: W0412 18:34:07.257167 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.257427 kubelet[2459]: E0412 18:34:07.257384 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.258401 kubelet[2459]: E0412 18:34:07.258383 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.258846 kubelet[2459]: W0412 18:34:07.258793 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.258998 kubelet[2459]: E0412 18:34:07.258985 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.259362 kubelet[2459]: E0412 18:34:07.259349 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.261052 kubelet[2459]: W0412 18:34:07.261027 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.261180 kubelet[2459]: E0412 18:34:07.261169 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.270194 kubelet[2459]: E0412 18:34:07.270170 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.270413 kubelet[2459]: W0412 18:34:07.270396 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.270521 kubelet[2459]: E0412 18:34:07.270482 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.270882 kubelet[2459]: E0412 18:34:07.270834 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.271004 kubelet[2459]: W0412 18:34:07.270986 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.271128 kubelet[2459]: E0412 18:34:07.271117 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.271492 kubelet[2459]: E0412 18:34:07.271470 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.271492 kubelet[2459]: W0412 18:34:07.271490 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.271667 kubelet[2459]: E0412 18:34:07.271507 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.271936 kubelet[2459]: E0412 18:34:07.271919 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.271936 kubelet[2459]: W0412 18:34:07.271931 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.272070 kubelet[2459]: E0412 18:34:07.271948 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.272345 kubelet[2459]: E0412 18:34:07.272169 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.272345 kubelet[2459]: W0412 18:34:07.272182 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.272345 kubelet[2459]: E0412 18:34:07.272239 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.272547 kubelet[2459]: E0412 18:34:07.272509 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.272547 kubelet[2459]: W0412 18:34:07.272521 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.272547 kubelet[2459]: E0412 18:34:07.272539 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.272924 kubelet[2459]: E0412 18:34:07.272756 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.272924 kubelet[2459]: W0412 18:34:07.272776 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.272924 kubelet[2459]: E0412 18:34:07.272822 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.273074 kubelet[2459]: E0412 18:34:07.273055 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.273074 kubelet[2459]: W0412 18:34:07.273070 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.273230 kubelet[2459]: E0412 18:34:07.273212 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.273365 kubelet[2459]: E0412 18:34:07.273226 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.273486 kubelet[2459]: W0412 18:34:07.273471 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.273662 kubelet[2459]: E0412 18:34:07.273601 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.276094 kubelet[2459]: E0412 18:34:07.276064 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.276561 kubelet[2459]: W0412 18:34:07.276541 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.277049 kubelet[2459]: E0412 18:34:07.277035 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.277572 kubelet[2459]: E0412 18:34:07.277269 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.277572 kubelet[2459]: W0412 18:34:07.277165 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.277721 kubelet[2459]: E0412 18:34:07.277706 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.277000 audit: BPF prog-id=125 op=LOAD Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2822 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663353136343831353835336136353964613233346630363538656639 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2822 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663353136343831353835336136353964613233346630363538656639 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit: BPF prog-id=126 op=LOAD Apr 12 18:34:07.278000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2822 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663353136343831353835336136353964613233346630363538656639 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit: BPF prog-id=127 op=LOAD Apr 12 18:34:07.278000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2822 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663353136343831353835336136353964613233346630363538656639 Apr 12 18:34:07.278000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:34:07.278000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.278000 audit: BPF prog-id=128 op=LOAD Apr 12 18:34:07.278000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2822 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663353136343831353835336136353964613233346630363538656639 Apr 12 18:34:07.284970 kubelet[2459]: E0412 18:34:07.284948 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.285122 kubelet[2459]: W0412 18:34:07.285105 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.285482 kubelet[2459]: E0412 18:34:07.285461 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.285770 kubelet[2459]: E0412 18:34:07.285759 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.285951 kubelet[2459]: W0412 18:34:07.285917 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.286142 kubelet[2459]: E0412 18:34:07.286129 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.286479 kubelet[2459]: E0412 18:34:07.286424 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.286560 kubelet[2459]: W0412 18:34:07.286547 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.286785 kubelet[2459]: E0412 18:34:07.286774 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.287056 kubelet[2459]: E0412 18:34:07.287045 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.287187 kubelet[2459]: W0412 18:34:07.287175 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.287408 kubelet[2459]: E0412 18:34:07.287396 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.287833 kubelet[2459]: E0412 18:34:07.287819 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.287960 kubelet[2459]: W0412 18:34:07.287947 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.288179 kubelet[2459]: E0412 18:34:07.288168 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.288502 kubelet[2459]: E0412 18:34:07.288489 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.288662 kubelet[2459]: W0412 18:34:07.288648 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.288897 kubelet[2459]: E0412 18:34:07.288861 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.289200 kubelet[2459]: E0412 18:34:07.289187 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.289395 kubelet[2459]: W0412 18:34:07.289363 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.289619 kubelet[2459]: E0412 18:34:07.289598 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.290166 kubelet[2459]: E0412 18:34:07.290151 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.290374 kubelet[2459]: W0412 18:34:07.290283 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.290572 kubelet[2459]: E0412 18:34:07.290562 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.290931 kubelet[2459]: E0412 18:34:07.290908 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.291058 kubelet[2459]: W0412 18:34:07.291046 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.292861 kubelet[2459]: E0412 18:34:07.292847 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.293187 kubelet[2459]: E0412 18:34:07.293176 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.293326 kubelet[2459]: W0412 18:34:07.293312 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.293532 kubelet[2459]: E0412 18:34:07.293517 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.293927 kubelet[2459]: E0412 18:34:07.293870 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.294048 kubelet[2459]: W0412 18:34:07.294010 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.294227 kubelet[2459]: E0412 18:34:07.294216 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.294565 kubelet[2459]: E0412 18:34:07.294554 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.294687 kubelet[2459]: W0412 18:34:07.294674 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.294922 kubelet[2459]: E0412 18:34:07.294910 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.296127 kubelet[2459]: E0412 18:34:07.296068 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.296253 kubelet[2459]: W0412 18:34:07.296213 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.296522 kubelet[2459]: E0412 18:34:07.296510 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.296992 kubelet[2459]: E0412 18:34:07.296959 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.297100 kubelet[2459]: W0412 18:34:07.297086 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.297291 kubelet[2459]: E0412 18:34:07.297280 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.297572 kubelet[2459]: E0412 18:34:07.297560 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.297702 kubelet[2459]: W0412 18:34:07.297690 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.297897 kubelet[2459]: E0412 18:34:07.297885 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.303342 kubelet[2459]: E0412 18:34:07.303258 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.303553 kubelet[2459]: W0412 18:34:07.303534 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.303665 kubelet[2459]: E0412 18:34:07.303654 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.325583 env[1336]: time="2024-04-12T18:34:07.325498183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5896b55b79-bnpj5,Uid:f206d5ed-4e7a-4430-83a0-fbc62a6d9eec,Namespace:calico-system,Attempt:0,} returns sandbox id \"fc5164815853a659da234f0658ef959ca7db0721c84f641f2ddfbe476ffebd0d\"" Apr 12 18:34:07.330857 env[1336]: time="2024-04-12T18:34:07.329977696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:34:07.331025 kubelet[2459]: E0412 18:34:07.330711 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:07.331025 kubelet[2459]: W0412 18:34:07.330732 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:07.331025 kubelet[2459]: E0412 18:34:07.330786 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:07.543550 env[1336]: time="2024-04-12T18:34:07.543450114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-skk8r,Uid:2d74a770-c3eb-4d33-b194-0e176d188427,Namespace:calico-system,Attempt:0,}" Apr 12 18:34:07.596035 env[1336]: time="2024-04-12T18:34:07.595946467Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:07.596229 env[1336]: time="2024-04-12T18:34:07.596016821Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:07.596229 env[1336]: time="2024-04-12T18:34:07.596188845Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:07.597054 env[1336]: time="2024-04-12T18:34:07.596994812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c pid=2913 runtime=io.containerd.runc.v2 Apr 12 18:34:07.623660 systemd[1]: Started cri-containerd-b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c.scope. Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.644000 audit: BPF prog-id=129 op=LOAD Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2913 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232333265386664373139373231393438343866386366373436663637 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2913 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232333265386664373139373231393438343866386366373436663637 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.645000 audit: BPF prog-id=130 op=LOAD Apr 12 18:34:07.645000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2913 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232333265386664373139373231393438343866386366373436663637 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit: BPF prog-id=131 op=LOAD Apr 12 18:34:07.646000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2913 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232333265386664373139373231393438343866386366373436663637 Apr 12 18:34:07.646000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:34:07.646000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:07.646000 audit: BPF prog-id=132 op=LOAD Apr 12 18:34:07.646000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2913 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232333265386664373139373231393438343866386366373436663637 Apr 12 18:34:07.678767 env[1336]: time="2024-04-12T18:34:07.678584884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-skk8r,Uid:2d74a770-c3eb-4d33-b194-0e176d188427,Namespace:calico-system,Attempt:0,} returns sandbox id \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\"" Apr 12 18:34:07.705000 audit[2950]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.705000 audit[2950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff09d68e0 a2=0 a3=1 items=0 ppid=2590 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.705000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:07.706000 audit[2950]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.706000 audit[2950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff09d68e0 a2=0 a3=1 items=0 ppid=2590 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:08.457682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4225063326.mount: Deactivated successfully. Apr 12 18:34:08.821421 kubelet[2459]: E0412 18:34:08.821239 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:09.236048 env[1336]: time="2024-04-12T18:34:09.235360089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:09.256926 env[1336]: time="2024-04-12T18:34:09.256885312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:09.264176 env[1336]: time="2024-04-12T18:34:09.264137153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:09.268263 env[1336]: time="2024-04-12T18:34:09.268223232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:09.268674 env[1336]: time="2024-04-12T18:34:09.268648555Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:34:09.271767 env[1336]: time="2024-04-12T18:34:09.271722324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:34:09.282759 env[1336]: time="2024-04-12T18:34:09.282698716Z" level=info msg="CreateContainer within sandbox \"fc5164815853a659da234f0658ef959ca7db0721c84f641f2ddfbe476ffebd0d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:34:09.330986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2109375822.mount: Deactivated successfully. Apr 12 18:34:09.346394 env[1336]: time="2024-04-12T18:34:09.346340985Z" level=info msg="CreateContainer within sandbox \"fc5164815853a659da234f0658ef959ca7db0721c84f641f2ddfbe476ffebd0d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b397da6e2a0552f7618cb053c5340123e34546649dc9b9f37644380c6e29f005\"" Apr 12 18:34:09.347324 env[1336]: time="2024-04-12T18:34:09.347282142Z" level=info msg="StartContainer for \"b397da6e2a0552f7618cb053c5340123e34546649dc9b9f37644380c6e29f005\"" Apr 12 18:34:09.367843 systemd[1]: Started cri-containerd-b397da6e2a0552f7618cb053c5340123e34546649dc9b9f37644380c6e29f005.scope. Apr 12 18:34:09.409536 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:34:09.409692 kernel: audit: type=1400 audit(1712946849.386:1098): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.448005 kernel: audit: type=1400 audit(1712946849.386:1099): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.448114 kernel: audit: type=1400 audit(1712946849.386:1100): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.465847 kernel: audit: type=1400 audit(1712946849.386:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.483871 kernel: audit: type=1400 audit(1712946849.386:1102): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.501141 kernel: audit: type=1400 audit(1712946849.386:1103): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.544761 kernel: audit: type=1400 audit(1712946849.386:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.544882 kernel: audit: type=1400 audit(1712946849.386:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.587780 kernel: audit: type=1400 audit(1712946849.386:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.587854 kernel: audit: type=1400 audit(1712946849.386:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.386000 audit: BPF prog-id=133 op=LOAD Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2822 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393764613665326130353532663736313863623035336335333430 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2822 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393764613665326130353532663736313863623035336335333430 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.408000 audit: BPF prog-id=134 op=LOAD Apr 12 18:34:09.408000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2822 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393764613665326130353532663736313863623035336335333430 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit: BPF prog-id=135 op=LOAD Apr 12 18:34:09.409000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2822 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:09.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393764613665326130353532663736313863623035336335333430 Apr 12 18:34:09.409000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:34:09.409000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:09.409000 audit: BPF prog-id=136 op=LOAD Apr 12 18:34:09.409000 audit[2962]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2822 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:09.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233393764613665326130353532663736313863623035336335333430 Apr 12 18:34:09.595112 env[1336]: time="2024-04-12T18:34:09.595053819Z" level=info msg="StartContainer for \"b397da6e2a0552f7618cb053c5340123e34546649dc9b9f37644380c6e29f005\" returns successfully" Apr 12 18:34:09.970611 kubelet[2459]: E0412 18:34:09.970579 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.970611 kubelet[2459]: W0412 18:34:09.970602 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.971003 kubelet[2459]: E0412 18:34:09.970623 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.971003 kubelet[2459]: E0412 18:34:09.970772 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.971003 kubelet[2459]: W0412 18:34:09.970780 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.971003 kubelet[2459]: E0412 18:34:09.970790 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.971401 kubelet[2459]: E0412 18:34:09.971376 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.971401 kubelet[2459]: W0412 18:34:09.971393 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.971503 kubelet[2459]: E0412 18:34:09.971408 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.971641 kubelet[2459]: E0412 18:34:09.971622 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.971641 kubelet[2459]: W0412 18:34:09.971634 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.971724 kubelet[2459]: E0412 18:34:09.971646 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.971887 kubelet[2459]: E0412 18:34:09.971863 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.971887 kubelet[2459]: W0412 18:34:09.971885 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.971977 kubelet[2459]: E0412 18:34:09.971897 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.972056 kubelet[2459]: E0412 18:34:09.972041 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.972056 kubelet[2459]: W0412 18:34:09.972053 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.972134 kubelet[2459]: E0412 18:34:09.972067 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.972315 kubelet[2459]: E0412 18:34:09.972283 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.972315 kubelet[2459]: W0412 18:34:09.972309 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.972404 kubelet[2459]: E0412 18:34:09.972322 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.972477 kubelet[2459]: E0412 18:34:09.972462 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.972477 kubelet[2459]: W0412 18:34:09.972474 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.972555 kubelet[2459]: E0412 18:34:09.972484 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.972721 kubelet[2459]: E0412 18:34:09.972703 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.972721 kubelet[2459]: W0412 18:34:09.972717 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.972814 kubelet[2459]: E0412 18:34:09.972728 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.972893 kubelet[2459]: E0412 18:34:09.972878 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.972893 kubelet[2459]: W0412 18:34:09.972891 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.972970 kubelet[2459]: E0412 18:34:09.972902 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.973115 kubelet[2459]: E0412 18:34:09.973098 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.973115 kubelet[2459]: W0412 18:34:09.973112 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.973203 kubelet[2459]: E0412 18:34:09.973123 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:09.973274 kubelet[2459]: E0412 18:34:09.973258 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:09.973274 kubelet[2459]: W0412 18:34:09.973271 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:09.973370 kubelet[2459]: E0412 18:34:09.973281 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.005145 kubelet[2459]: E0412 18:34:10.004806 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.005145 kubelet[2459]: W0412 18:34:10.004827 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.005145 kubelet[2459]: E0412 18:34:10.004848 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.005145 kubelet[2459]: E0412 18:34:10.005020 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.005145 kubelet[2459]: W0412 18:34:10.005028 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.005145 kubelet[2459]: E0412 18:34:10.005045 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.005682 kubelet[2459]: E0412 18:34:10.005535 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.005682 kubelet[2459]: W0412 18:34:10.005548 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.005682 kubelet[2459]: E0412 18:34:10.005568 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.005953 kubelet[2459]: E0412 18:34:10.005846 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.005953 kubelet[2459]: W0412 18:34:10.005857 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.005953 kubelet[2459]: E0412 18:34:10.005875 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.006195 kubelet[2459]: E0412 18:34:10.006106 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.006195 kubelet[2459]: W0412 18:34:10.006117 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.006195 kubelet[2459]: E0412 18:34:10.006154 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.006479 kubelet[2459]: E0412 18:34:10.006387 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.006479 kubelet[2459]: W0412 18:34:10.006399 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.006479 kubelet[2459]: E0412 18:34:10.006425 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.006715 kubelet[2459]: E0412 18:34:10.006627 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.006715 kubelet[2459]: W0412 18:34:10.006638 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.006715 kubelet[2459]: E0412 18:34:10.006663 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.007015 kubelet[2459]: E0412 18:34:10.006873 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.007015 kubelet[2459]: W0412 18:34:10.006887 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.007015 kubelet[2459]: E0412 18:34:10.006910 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.007431 kubelet[2459]: E0412 18:34:10.007176 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.007431 kubelet[2459]: W0412 18:34:10.007189 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.007431 kubelet[2459]: E0412 18:34:10.007208 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.007552 kubelet[2459]: E0412 18:34:10.007434 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.007552 kubelet[2459]: W0412 18:34:10.007445 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.007552 kubelet[2459]: E0412 18:34:10.007463 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.007621 kubelet[2459]: E0412 18:34:10.007605 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.007621 kubelet[2459]: W0412 18:34:10.007614 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.007673 kubelet[2459]: E0412 18:34:10.007625 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.007798 kubelet[2459]: E0412 18:34:10.007781 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.007798 kubelet[2459]: W0412 18:34:10.007795 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.007872 kubelet[2459]: E0412 18:34:10.007859 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.008240 kubelet[2459]: E0412 18:34:10.008218 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.008287 kubelet[2459]: W0412 18:34:10.008238 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.008532 kubelet[2459]: E0412 18:34:10.008385 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.008532 kubelet[2459]: E0412 18:34:10.008390 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.008532 kubelet[2459]: W0412 18:34:10.008419 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.008532 kubelet[2459]: E0412 18:34:10.008440 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.008832 kubelet[2459]: E0412 18:34:10.008709 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.008832 kubelet[2459]: W0412 18:34:10.008722 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.008832 kubelet[2459]: E0412 18:34:10.008742 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.009106 kubelet[2459]: E0412 18:34:10.008985 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.009106 kubelet[2459]: W0412 18:34:10.008996 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.009106 kubelet[2459]: E0412 18:34:10.009008 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.009717 kubelet[2459]: E0412 18:34:10.009253 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.009717 kubelet[2459]: W0412 18:34:10.009265 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.009717 kubelet[2459]: E0412 18:34:10.009276 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.009956 kubelet[2459]: E0412 18:34:10.009898 2459 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:34:10.009956 kubelet[2459]: W0412 18:34:10.009915 2459 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:34:10.009956 kubelet[2459]: E0412 18:34:10.009932 2459 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:34:10.546715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4235660317.mount: Deactivated successfully. Apr 12 18:34:10.781873 env[1336]: time="2024-04-12T18:34:10.781826055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:10.789757 env[1336]: time="2024-04-12T18:34:10.789706050Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:10.794599 env[1336]: time="2024-04-12T18:34:10.794547350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:10.800743 env[1336]: time="2024-04-12T18:34:10.800634741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:10.801203 env[1336]: time="2024-04-12T18:34:10.801176134Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:34:10.803698 env[1336]: time="2024-04-12T18:34:10.803654118Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:34:10.820464 kubelet[2459]: E0412 18:34:10.820431 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:10.871391 env[1336]: time="2024-04-12T18:34:10.871345836Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1\"" Apr 12 18:34:10.872324 env[1336]: time="2024-04-12T18:34:10.872283754Z" level=info msg="StartContainer for \"d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1\"" Apr 12 18:34:10.890378 systemd[1]: Started cri-containerd-d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1.scope. Apr 12 18:34:10.911000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.911000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2913 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:10.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393633336561616463303563363766623961333361623863323139 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit: BPF prog-id=137 op=LOAD Apr 12 18:34:10.912000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2913 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:10.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393633336561616463303563363766623961333361623863323139 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.912000 audit: BPF prog-id=138 op=LOAD Apr 12 18:34:10.912000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2913 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:10.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393633336561616463303563363766623961333361623863323139 Apr 12 18:34:10.913000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:34:10.913000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { perfmon } for pid=3027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit[3027]: AVC avc: denied { bpf } for pid=3027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:10.913000 audit: BPF prog-id=139 op=LOAD Apr 12 18:34:10.913000 audit[3027]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2913 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:10.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430393633336561616463303563363766623961333361623863323139 Apr 12 18:34:10.931376 env[1336]: time="2024-04-12T18:34:10.931315144Z" level=info msg="StartContainer for \"d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1\" returns successfully" Apr 12 18:34:10.940091 kubelet[2459]: I0412 18:34:10.939766 2459 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:34:10.942930 systemd[1]: cri-containerd-d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1.scope: Deactivated successfully. Apr 12 18:34:10.947000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:34:10.969361 kubelet[2459]: I0412 18:34:10.968963 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5896b55b79-bnpj5" podStartSLOduration=3.029063563 podCreationTimestamp="2024-04-12 18:34:06 +0000 UTC" firstStartedPulling="2024-04-12 18:34:07.329629608 +0000 UTC m=+22.646356767" lastFinishedPulling="2024-04-12 18:34:09.269478122 +0000 UTC m=+24.586205361" observedRunningTime="2024-04-12 18:34:09.952750125 +0000 UTC m=+25.269477284" watchObservedRunningTime="2024-04-12 18:34:10.968912157 +0000 UTC m=+26.285639276" Apr 12 18:34:11.850742 env[1336]: time="2024-04-12T18:34:11.850663407Z" level=info msg="shim disconnected" id=d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1 Apr 12 18:34:11.850742 env[1336]: time="2024-04-12T18:34:11.850742720Z" level=warning msg="cleaning up after shim disconnected" id=d09633eaadc05c67fb9a33ab8c21901fcf1ae28e74e9afb167561fc4a50817a1 namespace=k8s.io Apr 12 18:34:11.850742 env[1336]: time="2024-04-12T18:34:11.850753679Z" level=info msg="cleaning up dead shim" Apr 12 18:34:11.858122 env[1336]: time="2024-04-12T18:34:11.858065773Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:34:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3072 runtime=io.containerd.runc.v2\n" Apr 12 18:34:11.945146 env[1336]: time="2024-04-12T18:34:11.945103835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:34:12.820095 kubelet[2459]: E0412 18:34:12.820049 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:13.079874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1558715826.mount: Deactivated successfully. Apr 12 18:34:14.820435 kubelet[2459]: E0412 18:34:14.820402 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:15.144223 env[1336]: time="2024-04-12T18:34:15.144078475Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:15.150130 env[1336]: time="2024-04-12T18:34:15.150077868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:15.154962 env[1336]: time="2024-04-12T18:34:15.154899036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:15.159399 env[1336]: time="2024-04-12T18:34:15.159336356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:15.159996 env[1336]: time="2024-04-12T18:34:15.159956946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:34:15.162891 env[1336]: time="2024-04-12T18:34:15.162832592Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:34:15.212642 env[1336]: time="2024-04-12T18:34:15.212581714Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6\"" Apr 12 18:34:15.213544 env[1336]: time="2024-04-12T18:34:15.213506319Z" level=info msg="StartContainer for \"928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6\"" Apr 12 18:34:15.237182 systemd[1]: Started cri-containerd-928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6.scope. Apr 12 18:34:15.246998 systemd[1]: run-containerd-runc-k8s.io-928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6-runc.tKGPmQ.mount: Deactivated successfully. Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.286845 kernel: kauditd_printk_skb: 91 callbacks suppressed Apr 12 18:34:15.286998 kernel: audit: type=1400 audit(1712946855.279:1123): avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2913 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:15.334112 kernel: audit: type=1300 audit(1712946855.279:1123): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2913 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:15.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932386666663935636561666265613638313964393339346565343934 Apr 12 18:34:15.361176 kernel: audit: type=1327 audit(1712946855.279:1123): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932386666663935636561666265613638313964393339346565343934 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.380406 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.400992 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.420478 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.440064 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.459568 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.478229 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.479236 env[1336]: time="2024-04-12T18:34:15.479185711Z" level=info msg="StartContainer for \"928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6\" returns successfully" Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.498538 kernel: audit: type=1400 audit(1712946855.279:1124): avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit: BPF prog-id=140 op=LOAD Apr 12 18:34:15.279000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2913 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:15.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932386666663935636561666265613638313964393339346565343934 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit: BPF prog-id=141 op=LOAD Apr 12 18:34:15.279000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2913 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:15.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932386666663935636561666265613638313964393339346565343934 Apr 12 18:34:15.279000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:34:15.279000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:15.279000 audit: BPF prog-id=142 op=LOAD Apr 12 18:34:15.279000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2913 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:15.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932386666663935636561666265613638313964393339346565343934 Apr 12 18:34:16.821418 kubelet[2459]: E0412 18:34:16.821378 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:16.857226 env[1336]: time="2024-04-12T18:34:16.856971391Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:34:16.859073 systemd[1]: cri-containerd-928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6.scope: Deactivated successfully. Apr 12 18:34:16.862000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:34:16.878800 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6-rootfs.mount: Deactivated successfully. Apr 12 18:34:16.916360 kubelet[2459]: I0412 18:34:16.915115 2459 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.937649 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.945153 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.948786 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.972655 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6925f\" (UniqueName: \"kubernetes.io/projected/adac8183-817e-4cf8-93b3-8f7fd9dfbfe7-kube-api-access-6925f\") pod \"calico-kube-controllers-5f689f6cc7-47s8j\" (UID: \"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7\") " pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.972699 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2dsjl\" (UniqueName: \"kubernetes.io/projected/bde96c8c-ade0-4f9f-a39c-5a185b074d75-kube-api-access-2dsjl\") pod \"coredns-5d78c9869d-zbsh7\" (UID: \"bde96c8c-ade0-4f9f-a39c-5a185b074d75\") " pod="kube-system/coredns-5d78c9869d-zbsh7" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.972725 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d3847564-3c94-4e26-9e4b-f5292e262961-config-volume\") pod \"coredns-5d78c9869d-zr2bv\" (UID: \"d3847564-3c94-4e26-9e4b-f5292e262961\") " pod="kube-system/coredns-5d78c9869d-zr2bv" Apr 12 18:34:17.062151 kubelet[2459]: I0412 18:34:16.972750 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vz6vq\" (UniqueName: \"kubernetes.io/projected/d3847564-3c94-4e26-9e4b-f5292e262961-kube-api-access-vz6vq\") pod \"coredns-5d78c9869d-zr2bv\" (UID: \"d3847564-3c94-4e26-9e4b-f5292e262961\") " pod="kube-system/coredns-5d78c9869d-zr2bv" Apr 12 18:34:16.943024 systemd[1]: Created slice kubepods-burstable-podbde96c8c_ade0_4f9f_a39c_5a185b074d75.slice. Apr 12 18:34:17.062619 kubelet[2459]: I0412 18:34:16.972771 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bde96c8c-ade0-4f9f-a39c-5a185b074d75-config-volume\") pod \"coredns-5d78c9869d-zbsh7\" (UID: \"bde96c8c-ade0-4f9f-a39c-5a185b074d75\") " pod="kube-system/coredns-5d78c9869d-zbsh7" Apr 12 18:34:17.062619 kubelet[2459]: I0412 18:34:16.972795 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/adac8183-817e-4cf8-93b3-8f7fd9dfbfe7-tigera-ca-bundle\") pod \"calico-kube-controllers-5f689f6cc7-47s8j\" (UID: \"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7\") " pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" Apr 12 18:34:16.954439 systemd[1]: Created slice kubepods-burstable-podd3847564_3c94_4e26_9e4b_f5292e262961.slice. Apr 12 18:34:16.961241 systemd[1]: Created slice kubepods-besteffort-podadac8183_817e_4cf8_93b3_8f7fd9dfbfe7.slice. Apr 12 18:34:17.367178 env[1336]: time="2024-04-12T18:34:17.366813660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zr2bv,Uid:d3847564-3c94-4e26-9e4b-f5292e262961,Namespace:kube-system,Attempt:0,}" Apr 12 18:34:17.367178 env[1336]: time="2024-04-12T18:34:17.366867456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f689f6cc7-47s8j,Uid:adac8183-817e-4cf8-93b3-8f7fd9dfbfe7,Namespace:calico-system,Attempt:0,}" Apr 12 18:34:17.367178 env[1336]: time="2024-04-12T18:34:17.366821739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbsh7,Uid:bde96c8c-ade0-4f9f-a39c-5a185b074d75,Namespace:kube-system,Attempt:0,}" Apr 12 18:34:17.485060 env[1336]: time="2024-04-12T18:34:17.485014786Z" level=info msg="shim disconnected" id=928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6 Apr 12 18:34:17.485254 env[1336]: time="2024-04-12T18:34:17.485236129Z" level=warning msg="cleaning up after shim disconnected" id=928fff95ceafbea6819d9394ee4946ad2046df5977a1e74dc9300dec6809d5d6 namespace=k8s.io Apr 12 18:34:17.485369 env[1336]: time="2024-04-12T18:34:17.485353560Z" level=info msg="cleaning up dead shim" Apr 12 18:34:17.494686 env[1336]: time="2024-04-12T18:34:17.494639785Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:34:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3138 runtime=io.containerd.runc.v2\n" Apr 12 18:34:17.645201 env[1336]: time="2024-04-12T18:34:17.644849578Z" level=error msg="Failed to destroy network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.645733 env[1336]: time="2024-04-12T18:34:17.645689952Z" level=error msg="encountered an error cleaning up failed sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.646113 env[1336]: time="2024-04-12T18:34:17.646081401Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f689f6cc7-47s8j,Uid:adac8183-817e-4cf8-93b3-8f7fd9dfbfe7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.646696 kubelet[2459]: E0412 18:34:17.646502 2459 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.646696 kubelet[2459]: E0412 18:34:17.646573 2459 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" Apr 12 18:34:17.646696 kubelet[2459]: E0412 18:34:17.646602 2459 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" Apr 12 18:34:17.646860 kubelet[2459]: E0412 18:34:17.646657 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5f689f6cc7-47s8j_calico-system(adac8183-817e-4cf8-93b3-8f7fd9dfbfe7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5f689f6cc7-47s8j_calico-system(adac8183-817e-4cf8-93b3-8f7fd9dfbfe7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" podUID=adac8183-817e-4cf8-93b3-8f7fd9dfbfe7 Apr 12 18:34:17.687040 env[1336]: time="2024-04-12T18:34:17.686975565Z" level=error msg="Failed to destroy network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.687583 env[1336]: time="2024-04-12T18:34:17.687542200Z" level=error msg="encountered an error cleaning up failed sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.687730 env[1336]: time="2024-04-12T18:34:17.687703107Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbsh7,Uid:bde96c8c-ade0-4f9f-a39c-5a185b074d75,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.688068 kubelet[2459]: E0412 18:34:17.688040 2459 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.688165 kubelet[2459]: E0412 18:34:17.688096 2459 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zbsh7" Apr 12 18:34:17.688165 kubelet[2459]: E0412 18:34:17.688115 2459 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zbsh7" Apr 12 18:34:17.688228 kubelet[2459]: E0412 18:34:17.688180 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-zbsh7_kube-system(bde96c8c-ade0-4f9f-a39c-5a185b074d75)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-zbsh7_kube-system(bde96c8c-ade0-4f9f-a39c-5a185b074d75)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zbsh7" podUID=bde96c8c-ade0-4f9f-a39c-5a185b074d75 Apr 12 18:34:17.699135 env[1336]: time="2024-04-12T18:34:17.699038570Z" level=error msg="Failed to destroy network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.699508 env[1336]: time="2024-04-12T18:34:17.699467176Z" level=error msg="encountered an error cleaning up failed sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.699552 env[1336]: time="2024-04-12T18:34:17.699525652Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zr2bv,Uid:d3847564-3c94-4e26-9e4b-f5292e262961,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.700179 kubelet[2459]: E0412 18:34:17.699786 2459 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:17.700179 kubelet[2459]: E0412 18:34:17.699848 2459 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zr2bv" Apr 12 18:34:17.700179 kubelet[2459]: E0412 18:34:17.699868 2459 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zr2bv" Apr 12 18:34:17.700416 kubelet[2459]: E0412 18:34:17.699932 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-zr2bv_kube-system(d3847564-3c94-4e26-9e4b-f5292e262961)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-zr2bv_kube-system(d3847564-3c94-4e26-9e4b-f5292e262961)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zr2bv" podUID=d3847564-3c94-4e26-9e4b-f5292e262961 Apr 12 18:34:17.879807 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98-shm.mount: Deactivated successfully. Apr 12 18:34:17.965332 env[1336]: time="2024-04-12T18:34:17.964560758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:34:17.976340 kubelet[2459]: I0412 18:34:17.975533 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:17.981566 env[1336]: time="2024-04-12T18:34:17.981519376Z" level=info msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" Apr 12 18:34:17.983534 kubelet[2459]: I0412 18:34:17.982761 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:17.983682 env[1336]: time="2024-04-12T18:34:17.983368310Z" level=info msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" Apr 12 18:34:17.985154 kubelet[2459]: I0412 18:34:17.984986 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:17.986171 env[1336]: time="2024-04-12T18:34:17.986122972Z" level=info msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" Apr 12 18:34:18.019263 env[1336]: time="2024-04-12T18:34:18.019202172Z" level=error msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" failed" error="failed to destroy network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.019907 kubelet[2459]: E0412 18:34:18.019761 2459 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:18.019907 kubelet[2459]: E0412 18:34:18.019822 2459 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98} Apr 12 18:34:18.019907 kubelet[2459]: E0412 18:34:18.019856 2459 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:34:18.019907 kubelet[2459]: E0412 18:34:18.019884 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" podUID=adac8183-817e-4cf8-93b3-8f7fd9dfbfe7 Apr 12 18:34:18.042370 env[1336]: time="2024-04-12T18:34:18.042288368Z" level=error msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" failed" error="failed to destroy network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.042654 kubelet[2459]: E0412 18:34:18.042625 2459 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:18.042715 kubelet[2459]: E0412 18:34:18.042672 2459 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe} Apr 12 18:34:18.042740 kubelet[2459]: E0412 18:34:18.042726 2459 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3847564-3c94-4e26-9e4b-f5292e262961\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:34:18.042806 kubelet[2459]: E0412 18:34:18.042760 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3847564-3c94-4e26-9e4b-f5292e262961\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zr2bv" podUID=d3847564-3c94-4e26-9e4b-f5292e262961 Apr 12 18:34:18.043742 env[1336]: time="2024-04-12T18:34:18.043692138Z" level=error msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" failed" error="failed to destroy network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.044000 kubelet[2459]: E0412 18:34:18.043971 2459 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:18.044061 kubelet[2459]: E0412 18:34:18.044011 2459 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406} Apr 12 18:34:18.044061 kubelet[2459]: E0412 18:34:18.044058 2459 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bde96c8c-ade0-4f9f-a39c-5a185b074d75\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:34:18.044138 kubelet[2459]: E0412 18:34:18.044084 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bde96c8c-ade0-4f9f-a39c-5a185b074d75\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zbsh7" podUID=bde96c8c-ade0-4f9f-a39c-5a185b074d75 Apr 12 18:34:18.824631 systemd[1]: Created slice kubepods-besteffort-pod4aa58e7f_5556_4245_abd0_59216f6bf8aa.slice. Apr 12 18:34:18.828531 env[1336]: time="2024-04-12T18:34:18.828494679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zv96,Uid:4aa58e7f-5556-4245-abd0-59216f6bf8aa,Namespace:calico-system,Attempt:0,}" Apr 12 18:34:18.959949 env[1336]: time="2024-04-12T18:34:18.959872451Z" level=error msg="Failed to destroy network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.961946 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498-shm.mount: Deactivated successfully. Apr 12 18:34:18.963717 env[1336]: time="2024-04-12T18:34:18.963657915Z" level=error msg="encountered an error cleaning up failed sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.963888 env[1336]: time="2024-04-12T18:34:18.963861939Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zv96,Uid:4aa58e7f-5556-4245-abd0-59216f6bf8aa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.964700 kubelet[2459]: E0412 18:34:18.964246 2459 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:18.964700 kubelet[2459]: E0412 18:34:18.964354 2459 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:18.964700 kubelet[2459]: E0412 18:34:18.964379 2459 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5zv96" Apr 12 18:34:18.964858 kubelet[2459]: E0412 18:34:18.964443 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5zv96_calico-system(4aa58e7f-5556-4245-abd0-59216f6bf8aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5zv96_calico-system(4aa58e7f-5556-4245-abd0-59216f6bf8aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:18.988034 kubelet[2459]: I0412 18:34:18.987997 2459 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:18.988958 env[1336]: time="2024-04-12T18:34:18.988921901Z" level=info msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" Apr 12 18:34:19.014003 env[1336]: time="2024-04-12T18:34:19.013940317Z" level=error msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" failed" error="failed to destroy network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:34:19.014460 kubelet[2459]: E0412 18:34:19.014430 2459 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:19.014553 kubelet[2459]: E0412 18:34:19.014479 2459 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498} Apr 12 18:34:19.014553 kubelet[2459]: E0412 18:34:19.014516 2459 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:34:19.014553 kubelet[2459]: E0412 18:34:19.014544 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4aa58e7f-5556-4245-abd0-59216f6bf8aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5zv96" podUID=4aa58e7f-5556-4245-abd0-59216f6bf8aa Apr 12 18:34:20.925332 kubelet[2459]: I0412 18:34:20.924726 2459 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:34:21.004987 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:34:21.005127 kernel: audit: type=1325 audit(1712946860.983:1130): table=filter:98 family=2 entries=15 op=nft_register_rule pid=3356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:20.983000 audit[3356]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=3356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:20.983000 audit[3356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe73d2490 a2=0 a3=1 items=0 ppid=2590 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:20.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:21.054743 kernel: audit: type=1300 audit(1712946860.983:1130): arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe73d2490 a2=0 a3=1 items=0 ppid=2590 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:21.054848 kernel: audit: type=1327 audit(1712946860.983:1130): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:21.006000 audit[3356]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:21.073715 kernel: audit: type=1325 audit(1712946861.006:1131): table=nat:99 family=2 entries=19 op=nft_register_chain pid=3356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:21.006000 audit[3356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffe73d2490 a2=0 a3=1 items=0 ppid=2590 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:21.105859 kernel: audit: type=1300 audit(1712946861.006:1131): arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffe73d2490 a2=0 a3=1 items=0 ppid=2590 pid=3356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:21.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:21.122677 kernel: audit: type=1327 audit(1712946861.006:1131): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:22.936560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount114877537.mount: Deactivated successfully. Apr 12 18:34:23.114423 env[1336]: time="2024-04-12T18:34:23.114365927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:23.120776 env[1336]: time="2024-04-12T18:34:23.120712379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:23.125692 env[1336]: time="2024-04-12T18:34:23.125635336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:23.131897 env[1336]: time="2024-04-12T18:34:23.131852078Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:23.132276 env[1336]: time="2024-04-12T18:34:23.132241009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:34:23.148775 env[1336]: time="2024-04-12T18:34:23.148724114Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:34:23.200909 env[1336]: time="2024-04-12T18:34:23.200840632Z" level=info msg="CreateContainer within sandbox \"b232e8fd71972194848f8cf746f67ce1094c7c81519cd8b3384315f9d58be13c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3\"" Apr 12 18:34:23.203266 env[1336]: time="2024-04-12T18:34:23.202336522Z" level=info msg="StartContainer for \"df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3\"" Apr 12 18:34:23.219791 systemd[1]: Started cri-containerd-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3.scope. Apr 12 18:34:23.237000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.237000 audit[3367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2913 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:23.285545 kernel: audit: type=1400 audit(1712946863.237:1132): avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.285669 kernel: audit: type=1300 audit(1712946863.237:1132): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2913 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:23.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396537666237663765656131373333363464383639623030353233 Apr 12 18:34:23.311204 kernel: audit: type=1327 audit(1712946863.237:1132): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396537666237663765656131373333363464383639623030353233 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.329734 kernel: audit: type=1400 audit(1712946863.238:1133): avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.238000 audit: BPF prog-id=143 op=LOAD Apr 12 18:34:23.238000 audit[3367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2913 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:23.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396537666237663765656131373333363464383639623030353233 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.256000 audit: BPF prog-id=144 op=LOAD Apr 12 18:34:23.256000 audit[3367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2913 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:23.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396537666237663765656131373333363464383639623030353233 Apr 12 18:34:23.257000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:34:23.257000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:23.257000 audit: BPF prog-id=145 op=LOAD Apr 12 18:34:23.257000 audit[3367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2913 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:23.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466396537666237663765656131373333363464383639623030353233 Apr 12 18:34:23.346161 env[1336]: time="2024-04-12T18:34:23.345915937Z" level=info msg="StartContainer for \"df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3\" returns successfully" Apr 12 18:34:24.044549 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.E1J2Gu.mount: Deactivated successfully. Apr 12 18:34:25.008176 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:34:25.008343 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:34:25.078971 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.OG6ZXy.mount: Deactivated successfully. Apr 12 18:34:26.451435 kernel: kauditd_printk_skb: 39 callbacks suppressed Apr 12 18:34:26.451591 kernel: audit: type=1400 audit(1712946866.427:1138): avc: denied { write } for pid=3496 comm="tee" name="fd" dev="proc" ino=24042 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.427000 audit[3496]: AVC avc: denied { write } for pid=3496 comm="tee" name="fd" dev="proc" ino=24042 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.427000 audit[3496]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc1d1979 a2=241 a3=1b6 items=1 ppid=3474 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.489323 kernel: audit: type=1300 audit(1712946866.427:1138): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc1d1979 a2=241 a3=1b6 items=1 ppid=3474 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.427000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:34:26.517443 kernel: audit: type=1307 audit(1712946866.427:1138): cwd="/etc/service/enabled/felix/log" Apr 12 18:34:26.427000 audit: PATH item=0 name="/dev/fd/63" inode=24039 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.542356 kernel: audit: type=1302 audit(1712946866.427:1138): item=0 name="/dev/fd/63" inode=24039 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.484000 audit[3518]: AVC avc: denied { write } for pid=3518 comm="tee" name="fd" dev="proc" ino=24071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.579772 kernel: audit: type=1327 audit(1712946866.427:1138): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.579873 kernel: audit: type=1400 audit(1712946866.484:1139): avc: denied { write } for pid=3518 comm="tee" name="fd" dev="proc" ino=24071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.484000 audit[3518]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff530d969 a2=241 a3=1b6 items=1 ppid=3476 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.484000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:34:26.610464 kernel: audit: type=1300 audit(1712946866.484:1139): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff530d969 a2=241 a3=1b6 items=1 ppid=3476 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.484000 audit: PATH item=0 name="/dev/fd/63" inode=24067 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.640646 kernel: audit: type=1307 audit(1712946866.484:1139): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:34:26.640736 kernel: audit: type=1302 audit(1712946866.484:1139): item=0 name="/dev/fd/63" inode=24067 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.484000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.661045 kernel: audit: type=1327 audit(1712946866.484:1139): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.485000 audit[3520]: AVC avc: denied { write } for pid=3520 comm="tee" name="fd" dev="proc" ino=24075 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.485000 audit[3520]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc6752979 a2=241 a3=1b6 items=1 ppid=3473 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.485000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:34:26.485000 audit: PATH item=0 name="/dev/fd/63" inode=24068 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.485000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.541000 audit[3538]: AVC avc: denied { write } for pid=3538 comm="tee" name="fd" dev="proc" ino=24102 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.541000 audit[3538]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc0b5396a a2=241 a3=1b6 items=1 ppid=3478 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.541000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:34:26.541000 audit: PATH item=0 name="/dev/fd/63" inode=24932 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.544000 audit[3540]: AVC avc: denied { write } for pid=3540 comm="tee" name="fd" dev="proc" ino=24106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.544000 audit[3540]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb6be97a a2=241 a3=1b6 items=1 ppid=3477 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.544000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:34:26.544000 audit: PATH item=0 name="/dev/fd/63" inode=24933 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.544000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.546000 audit[3542]: AVC avc: denied { write } for pid=3542 comm="tee" name="fd" dev="proc" ino=24110 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.546000 audit[3542]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe80c1979 a2=241 a3=1b6 items=1 ppid=3482 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.546000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:34:26.546000 audit: PATH item=0 name="/dev/fd/63" inode=24934 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.553000 audit[3544]: AVC avc: denied { write } for pid=3544 comm="tee" name="fd" dev="proc" ino=24114 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:34:26.553000 audit[3544]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7bd897b a2=241 a3=1b6 items=1 ppid=3481 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.553000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:34:26.553000 audit: PATH item=0 name="/dev/fd/63" inode=24935 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:34:26.553000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.945000 audit: BPF prog-id=146 op=LOAD Apr 12 18:34:26.945000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdd1f08c8 a2=70 a3=ffffdd1f0938 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.946000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit: BPF prog-id=147 op=LOAD Apr 12 18:34:26.946000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdd1f08c8 a2=70 a3=4b243c items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.946000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdd1f0880 a2=70 a3=ffffdd1f08f0 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.946000 audit: BPF prog-id=148 op=LOAD Apr 12 18:34:26.946000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdd1f0868 a2=70 a3=ffffdd1f08d8 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.947000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:34:26.947000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.947000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd1f0938 a2=70 a3=0 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.947000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.947000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.947000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd1f0928 a2=70 a3=0 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.947000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.948000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.948000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdd1f0898 a2=70 a3=0 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.948000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.948000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdd1f0970 a2=70 a3=7e439ef items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.948000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.948000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdd1f0970 a2=70 a3=7e439ef items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.949000 audit: BPF prog-id=149 op=LOAD Apr 12 18:34:26.949000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd1f0898 a2=70 a3=7e43a09 items=0 ppid=3479 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:34:26.952000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.952000 audit[3613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffc03a228 a2=70 a3=fffffc03a298 items=0 ppid=3479 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:34:26.953000 audit[3613]: AVC avc: denied { bpf } for pid=3613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.953000 audit[3613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffffc03a0f8 a2=70 a3=fffffc03a168 items=0 ppid=3479 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:34:26.959000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:34:27.436000 audit[3643]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:27.436000 audit[3643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff1308c40 a2=0 a3=ffffbda97fa8 items=0 ppid=3479 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:27.497000 audit[3642]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3642 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:27.497000 audit[3642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdf6d4ea0 a2=0 a3=ffff9cdbffa8 items=0 ppid=3479 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:27.498000 audit[3640]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:27.498000 audit[3640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd8e4a200 a2=0 a3=ffff973fdfa8 items=0 ppid=3479 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.498000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:27.499000 audit[3638]: NETFILTER_CFG table=raw:103 family=2 entries=19 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:27.499000 audit[3638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffdd3c2370 a2=0 a3=ffffa7cf6fa8 items=0 ppid=3479 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:27.800861 systemd-networkd[1481]: vxlan.calico: Link UP Apr 12 18:34:27.800870 systemd-networkd[1481]: vxlan.calico: Gained carrier Apr 12 18:34:28.821930 env[1336]: time="2024-04-12T18:34:28.820823491Z" level=info msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" Apr 12 18:34:28.871330 kubelet[2459]: I0412 18:34:28.868923 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-skk8r" podStartSLOduration=7.416881809 podCreationTimestamp="2024-04-12 18:34:06 +0000 UTC" firstStartedPulling="2024-04-12 18:34:07.680558265 +0000 UTC m=+22.997285384" lastFinishedPulling="2024-04-12 18:34:23.132546187 +0000 UTC m=+38.449273346" observedRunningTime="2024-04-12 18:34:24.031427947 +0000 UTC m=+39.348155106" watchObservedRunningTime="2024-04-12 18:34:28.868869771 +0000 UTC m=+44.185596930" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.871 [INFO][3668] k8s.go 585: Cleaning up netns ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.872 [INFO][3668] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" iface="eth0" netns="/var/run/netns/cni-3ec11ab0-e2ee-962a-93d8-154d534cfa8a" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.872 [INFO][3668] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" iface="eth0" netns="/var/run/netns/cni-3ec11ab0-e2ee-962a-93d8-154d534cfa8a" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.872 [INFO][3668] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" iface="eth0" netns="/var/run/netns/cni-3ec11ab0-e2ee-962a-93d8-154d534cfa8a" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.872 [INFO][3668] k8s.go 592: Releasing IP address(es) ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.872 [INFO][3668] utils.go 188: Calico CNI releasing IP address ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.890 [INFO][3674] ipam_plugin.go 415: Releasing address using handleID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.890 [INFO][3674] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.891 [INFO][3674] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.900 [WARNING][3674] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.900 [INFO][3674] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.901 [INFO][3674] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:28.904167 env[1336]: 2024-04-12 18:34:28.902 [INFO][3668] k8s.go 598: Teardown processing complete. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:28.906949 systemd[1]: run-netns-cni\x2d3ec11ab0\x2de2ee\x2d962a\x2d93d8\x2d154d534cfa8a.mount: Deactivated successfully. Apr 12 18:34:28.908138 env[1336]: time="2024-04-12T18:34:28.908100628Z" level=info msg="TearDown network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" successfully" Apr 12 18:34:28.908220 env[1336]: time="2024-04-12T18:34:28.908205380Z" level=info msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" returns successfully" Apr 12 18:34:28.909095 env[1336]: time="2024-04-12T18:34:28.909068400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbsh7,Uid:bde96c8c-ade0-4f9f-a39c-5a185b074d75,Namespace:kube-system,Attempt:1,}" Apr 12 18:34:29.090373 systemd-networkd[1481]: cali45451e08d98: Link UP Apr 12 18:34:29.104286 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:29.104442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali45451e08d98: link becomes ready Apr 12 18:34:29.108111 systemd-networkd[1481]: cali45451e08d98: Gained carrier Apr 12 18:34:29.112482 systemd-networkd[1481]: vxlan.calico: Gained IPv6LL Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.019 [INFO][3681] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0 coredns-5d78c9869d- kube-system bde96c8c-ade0-4f9f-a39c-5a185b074d75 707 0 2024-04-12 18:34:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 coredns-5d78c9869d-zbsh7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali45451e08d98 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.020 [INFO][3681] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.047 [INFO][3692] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" HandleID="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.059 [INFO][3692] ipam_plugin.go 268: Auto assigning IP ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" HandleID="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263830), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-7076f33771", "pod":"coredns-5d78c9869d-zbsh7", "timestamp":"2024-04-12 18:34:29.047847407 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.059 [INFO][3692] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.059 [INFO][3692] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.059 [INFO][3692] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.061 [INFO][3692] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.067 [INFO][3692] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.070 [INFO][3692] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.072 [INFO][3692] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.074 [INFO][3692] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.074 [INFO][3692] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.075 [INFO][3692] ipam.go 1682: Creating new handle: k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35 Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.079 [INFO][3692] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.084 [INFO][3692] ipam.go 1216: Successfully claimed IPs: [192.168.3.193/26] block=192.168.3.192/26 handle="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.084 [INFO][3692] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.193/26] handle="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.084 [INFO][3692] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:29.117890 env[1336]: 2024-04-12 18:34:29.084 [INFO][3692] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.193/26] IPv6=[] ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" HandleID="k8s-pod-network.899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.086 [INFO][3681] k8s.go 385: Populated endpoint ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bde96c8c-ade0-4f9f-a39c-5a185b074d75", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"coredns-5d78c9869d-zbsh7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45451e08d98", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.086 [INFO][3681] k8s.go 386: Calico CNI using IPs: [192.168.3.193/32] ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.086 [INFO][3681] dataplane_linux.go 68: Setting the host side veth name to cali45451e08d98 ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.107 [INFO][3681] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.108 [INFO][3681] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bde96c8c-ade0-4f9f-a39c-5a185b074d75", ResourceVersion:"707", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35", Pod:"coredns-5d78c9869d-zbsh7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45451e08d98", MAC:"d2:98:1f:10:98:93", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:29.118580 env[1336]: 2024-04-12 18:34:29.116 [INFO][3681] k8s.go 498: Wrote updated endpoint to datastore ContainerID="899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35" Namespace="kube-system" Pod="coredns-5d78c9869d-zbsh7" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:29.140458 env[1336]: time="2024-04-12T18:34:29.136540185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:29.140458 env[1336]: time="2024-04-12T18:34:29.136587062Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:29.140458 env[1336]: time="2024-04-12T18:34:29.136596861Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:29.140458 env[1336]: time="2024-04-12T18:34:29.136805087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35 pid=3720 runtime=io.containerd.runc.v2 Apr 12 18:34:29.165000 audit[3742]: NETFILTER_CFG table=filter:104 family=2 entries=36 op=nft_register_chain pid=3742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:29.165000 audit[3742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffdaadfc70 a2=0 a3=ffffa9964fa8 items=0 ppid=3479 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:29.168480 systemd[1]: Started cri-containerd-899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35.scope. Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.180000 audit: BPF prog-id=150 op=LOAD Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3720 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396630323761653366363466326464346361313834666232333238 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3720 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396630323761653366363466326464346361313834666232333238 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit: BPF prog-id=151 op=LOAD Apr 12 18:34:29.181000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3720 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396630323761653366363466326464346361313834666232333238 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit: BPF prog-id=152 op=LOAD Apr 12 18:34:29.181000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3720 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396630323761653366363466326464346361313834666232333238 Apr 12 18:34:29.181000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:34:29.181000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.181000 audit: BPF prog-id=153 op=LOAD Apr 12 18:34:29.181000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3720 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396630323761653366363466326464346361313834666232333238 Apr 12 18:34:29.204768 env[1336]: time="2024-04-12T18:34:29.204715705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbsh7,Uid:bde96c8c-ade0-4f9f-a39c-5a185b074d75,Namespace:kube-system,Attempt:1,} returns sandbox id \"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35\"" Apr 12 18:34:29.210162 env[1336]: time="2024-04-12T18:34:29.210081613Z" level=info msg="CreateContainer within sandbox \"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:34:29.253731 env[1336]: time="2024-04-12T18:34:29.253682194Z" level=info msg="CreateContainer within sandbox \"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dfe4de3b0eeda4706267c82698c76a28102322c19d0eb573d4460e8f6ed7ecff\"" Apr 12 18:34:29.254498 env[1336]: time="2024-04-12T18:34:29.254464980Z" level=info msg="StartContainer for \"dfe4de3b0eeda4706267c82698c76a28102322c19d0eb573d4460e8f6ed7ecff\"" Apr 12 18:34:29.269239 systemd[1]: Started cri-containerd-dfe4de3b0eeda4706267c82698c76a28102322c19d0eb573d4460e8f6ed7ecff.scope. Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit: BPF prog-id=154 op=LOAD Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3720 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653464653362306565646134373036323637633832363938633736 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3720 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653464653362306565646134373036323637633832363938633736 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.284000 audit: BPF prog-id=155 op=LOAD Apr 12 18:34:29.284000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3720 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653464653362306565646134373036323637633832363938633736 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit: BPF prog-id=156 op=LOAD Apr 12 18:34:29.285000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3720 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653464653362306565646134373036323637633832363938633736 Apr 12 18:34:29.285000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:34:29.285000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:29.285000 audit: BPF prog-id=157 op=LOAD Apr 12 18:34:29.285000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3720 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:29.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653464653362306565646134373036323637633832363938633736 Apr 12 18:34:29.463130 env[1336]: time="2024-04-12T18:34:29.463076775Z" level=info msg="StartContainer for \"dfe4de3b0eeda4706267c82698c76a28102322c19d0eb573d4460e8f6ed7ecff\" returns successfully" Apr 12 18:34:29.906996 systemd[1]: run-containerd-runc-k8s.io-899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35-runc.hKjroX.mount: Deactivated successfully. Apr 12 18:34:30.045054 kubelet[2459]: I0412 18:34:30.045016 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-zbsh7" podStartSLOduration=30.04497851 podCreationTimestamp="2024-04-12 18:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:34:30.044878637 +0000 UTC m=+45.361605796" watchObservedRunningTime="2024-04-12 18:34:30.04497851 +0000 UTC m=+45.361705669" Apr 12 18:34:30.064000 audit[3794]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:30.064000 audit[3794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff41bf7d0 a2=0 a3=1 items=0 ppid=2590 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:30.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:30.065000 audit[3794]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:30.065000 audit[3794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff41bf7d0 a2=0 a3=1 items=0 ppid=2590 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:30.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:30.079000 audit[3796]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:30.079000 audit[3796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdfb6b440 a2=0 a3=1 items=0 ppid=2590 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:30.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:30.080000 audit[3796]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:30.080000 audit[3796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffdfb6b440 a2=0 a3=1 items=0 ppid=2590 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:30.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:30.195450 systemd-networkd[1481]: cali45451e08d98: Gained IPv6LL Apr 12 18:34:31.820225 env[1336]: time="2024-04-12T18:34:31.820180259Z" level=info msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] k8s.go 585: Cleaning up netns ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" iface="eth0" netns="/var/run/netns/cni-44cc4045-cd97-c92c-a3d8-6b6358cad5b2" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" iface="eth0" netns="/var/run/netns/cni-44cc4045-cd97-c92c-a3d8-6b6358cad5b2" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" iface="eth0" netns="/var/run/netns/cni-44cc4045-cd97-c92c-a3d8-6b6358cad5b2" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] k8s.go 592: Releasing IP address(es) ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.873 [INFO][3814] utils.go 188: Calico CNI releasing IP address ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.892 [INFO][3820] ipam_plugin.go 415: Releasing address using handleID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.892 [INFO][3820] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.892 [INFO][3820] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.900 [WARNING][3820] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.900 [INFO][3820] ipam_plugin.go 443: Releasing address using workloadID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.902 [INFO][3820] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:31.904792 env[1336]: 2024-04-12 18:34:31.903 [INFO][3814] k8s.go 598: Teardown processing complete. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:31.908768 systemd[1]: run-netns-cni\x2d44cc4045\x2dcd97\x2dc92c\x2da3d8\x2d6b6358cad5b2.mount: Deactivated successfully. Apr 12 18:34:31.909549 env[1336]: time="2024-04-12T18:34:31.909473473Z" level=info msg="TearDown network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" successfully" Apr 12 18:34:31.909549 env[1336]: time="2024-04-12T18:34:31.909545148Z" level=info msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" returns successfully" Apr 12 18:34:31.915123 env[1336]: time="2024-04-12T18:34:31.915058013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zr2bv,Uid:d3847564-3c94-4e26-9e4b-f5292e262961,Namespace:kube-system,Attempt:1,}" Apr 12 18:34:32.080041 systemd-networkd[1481]: calibb70b666ffb: Link UP Apr 12 18:34:32.095594 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:32.095734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibb70b666ffb: link becomes ready Apr 12 18:34:32.096903 systemd-networkd[1481]: calibb70b666ffb: Gained carrier Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.000 [INFO][3828] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0 coredns-5d78c9869d- kube-system d3847564-3c94-4e26-9e4b-f5292e262961 729 0 2024-04-12 18:34:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 coredns-5d78c9869d-zr2bv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibb70b666ffb [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.000 [INFO][3828] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.030 [INFO][3840] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" HandleID="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.044 [INFO][3840] ipam_plugin.go 268: Auto assigning IP ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" HandleID="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400050b9b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-7076f33771", "pod":"coredns-5d78c9869d-zr2bv", "timestamp":"2024-04-12 18:34:32.030017822 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.044 [INFO][3840] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.044 [INFO][3840] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.044 [INFO][3840] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.046 [INFO][3840] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.049 [INFO][3840] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.053 [INFO][3840] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.055 [INFO][3840] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.057 [INFO][3840] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.058 [INFO][3840] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.059 [INFO][3840] ipam.go 1682: Creating new handle: k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73 Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.063 [INFO][3840] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.068 [INFO][3840] ipam.go 1216: Successfully claimed IPs: [192.168.3.194/26] block=192.168.3.192/26 handle="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.068 [INFO][3840] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.194/26] handle="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.068 [INFO][3840] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:32.108975 env[1336]: 2024-04-12 18:34:32.068 [INFO][3840] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.194/26] IPv6=[] ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" HandleID="k8s-pod-network.141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.071 [INFO][3828] k8s.go 385: Populated endpoint ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3847564-3c94-4e26-9e4b-f5292e262961", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"coredns-5d78c9869d-zr2bv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb70b666ffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.072 [INFO][3828] k8s.go 386: Calico CNI using IPs: [192.168.3.194/32] ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.072 [INFO][3828] dataplane_linux.go 68: Setting the host side veth name to calibb70b666ffb ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.096 [INFO][3828] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.097 [INFO][3828] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3847564-3c94-4e26-9e4b-f5292e262961", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73", Pod:"coredns-5d78c9869d-zr2bv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb70b666ffb", MAC:"2e:85:bf:01:7b:b0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:32.109575 env[1336]: 2024-04-12 18:34:32.107 [INFO][3828] k8s.go 498: Wrote updated endpoint to datastore ContainerID="141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73" Namespace="kube-system" Pod="coredns-5d78c9869d-zr2bv" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:32.119000 audit[3858]: NETFILTER_CFG table=filter:109 family=2 entries=30 op=nft_register_chain pid=3858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:32.126330 kernel: kauditd_printk_skb: 243 callbacks suppressed Apr 12 18:34:32.126469 kernel: audit: type=1325 audit(1712946872.119:1206): table=filter:109 family=2 entries=30 op=nft_register_chain pid=3858 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:32.128113 env[1336]: time="2024-04-12T18:34:32.128041104Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:32.128414 env[1336]: time="2024-04-12T18:34:32.128386961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:32.128556 env[1336]: time="2024-04-12T18:34:32.128530271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:32.128835 env[1336]: time="2024-04-12T18:34:32.128805493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73 pid=3865 runtime=io.containerd.runc.v2 Apr 12 18:34:32.119000 audit[3858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=ffffe77560a0 a2=0 a3=ffff916a6fa8 items=0 ppid=3479 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.175629 kernel: audit: type=1300 audit(1712946872.119:1206): arch=c00000b7 syscall=211 success=yes exit=17032 a0=3 a1=ffffe77560a0 a2=0 a3=ffff916a6fa8 items=0 ppid=3479 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.175775 kernel: audit: type=1327 audit(1712946872.119:1206): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:32.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:32.209468 systemd[1]: Started cri-containerd-141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73.scope. Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.263363 kernel: audit: type=1400 audit(1712946872.224:1207): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.263471 kernel: audit: type=1400 audit(1712946872.224:1208): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.282945 kernel: audit: type=1400 audit(1712946872.224:1209): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.302234 kernel: audit: type=1400 audit(1712946872.224:1210): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.322669 kernel: audit: type=1400 audit(1712946872.224:1211): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.341714 kernel: audit: type=1400 audit(1712946872.224:1212): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.353242 env[1336]: time="2024-04-12T18:34:32.353202150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zr2bv,Uid:d3847564-3c94-4e26-9e4b-f5292e262961,Namespace:kube-system,Attempt:1,} returns sandbox id \"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73\"" Apr 12 18:34:32.361150 kernel: audit: type=1400 audit(1712946872.224:1213): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.242000 audit: BPF prog-id=158 op=LOAD Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3865 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316565366335306466623133373763623534613964613865633235 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3865 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316565366335306466623133373763623534613964613865633235 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit: BPF prog-id=159 op=LOAD Apr 12 18:34:32.243000 audit[3873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3865 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316565366335306466623133373763623534613964613865633235 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit: BPF prog-id=160 op=LOAD Apr 12 18:34:32.243000 audit[3873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3865 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316565366335306466623133373763623534613964613865633235 Apr 12 18:34:32.243000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:34:32.243000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.243000 audit: BPF prog-id=161 op=LOAD Apr 12 18:34:32.243000 audit[3873]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3865 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316565366335306466623133373763623534613964613865633235 Apr 12 18:34:32.368150 env[1336]: time="2024-04-12T18:34:32.365748345Z" level=info msg="CreateContainer within sandbox \"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:34:32.404678 env[1336]: time="2024-04-12T18:34:32.404620569Z" level=info msg="CreateContainer within sandbox \"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d68c0663613cf526ee52123faa1dc7e50c21352a25a0126f96fbb3135a70524d\"" Apr 12 18:34:32.406816 env[1336]: time="2024-04-12T18:34:32.405415315Z" level=info msg="StartContainer for \"d68c0663613cf526ee52123faa1dc7e50c21352a25a0126f96fbb3135a70524d\"" Apr 12 18:34:32.422247 systemd[1]: Started cri-containerd-d68c0663613cf526ee52123faa1dc7e50c21352a25a0126f96fbb3135a70524d.scope. Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.436000 audit: BPF prog-id=162 op=LOAD Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3865 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436386330363633363133636635323665653532313233666161316463 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3865 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436386330363633363133636635323665653532313233666161316463 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.437000 audit: BPF prog-id=163 op=LOAD Apr 12 18:34:32.437000 audit[3906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3865 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436386330363633363133636635323665653532313233666161316463 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.438000 audit: BPF prog-id=164 op=LOAD Apr 12 18:34:32.438000 audit[3906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3865 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436386330363633363133636635323665653532313233666161316463 Apr 12 18:34:32.439000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:34:32.439000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:32.439000 audit: BPF prog-id=165 op=LOAD Apr 12 18:34:32.439000 audit[3906]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3865 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436386330363633363133636635323665653532313233666161316463 Apr 12 18:34:32.463073 env[1336]: time="2024-04-12T18:34:32.463021918Z" level=info msg="StartContainer for \"d68c0663613cf526ee52123faa1dc7e50c21352a25a0126f96fbb3135a70524d\" returns successfully" Apr 12 18:34:32.821719 env[1336]: time="2024-04-12T18:34:32.821624862Z" level=info msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.867 [INFO][3956] k8s.go 585: Cleaning up netns ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.868 [INFO][3956] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" iface="eth0" netns="/var/run/netns/cni-496dafca-d0a4-b7ca-fb2a-ac3d8f951132" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.869 [INFO][3956] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" iface="eth0" netns="/var/run/netns/cni-496dafca-d0a4-b7ca-fb2a-ac3d8f951132" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.869 [INFO][3956] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" iface="eth0" netns="/var/run/netns/cni-496dafca-d0a4-b7ca-fb2a-ac3d8f951132" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.869 [INFO][3956] k8s.go 592: Releasing IP address(es) ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.869 [INFO][3956] utils.go 188: Calico CNI releasing IP address ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.893 [INFO][3962] ipam_plugin.go 415: Releasing address using handleID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.893 [INFO][3962] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.893 [INFO][3962] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.911 [WARNING][3962] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.912 [INFO][3962] ipam_plugin.go 443: Releasing address using workloadID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.915 [INFO][3962] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:32.919406 env[1336]: 2024-04-12 18:34:32.916 [INFO][3956] k8s.go 598: Teardown processing complete. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:32.921903 systemd[1]: run-netns-cni\x2d496dafca\x2dd0a4\x2db7ca\x2dfb2a\x2dac3d8f951132.mount: Deactivated successfully. Apr 12 18:34:32.923189 env[1336]: time="2024-04-12T18:34:32.923136829Z" level=info msg="TearDown network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" successfully" Apr 12 18:34:32.923334 env[1336]: time="2024-04-12T18:34:32.923278780Z" level=info msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" returns successfully" Apr 12 18:34:32.924963 env[1336]: time="2024-04-12T18:34:32.924923629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f689f6cc7-47s8j,Uid:adac8183-817e-4cf8-93b3-8f7fd9dfbfe7,Namespace:calico-system,Attempt:1,}" Apr 12 18:34:33.065000 audit[3986]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:33.065000 audit[3986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc9120310 a2=0 a3=1 items=0 ppid=2590 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:33.071456 kubelet[2459]: I0412 18:34:33.071425 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-zr2bv" podStartSLOduration=33.071385254 podCreationTimestamp="2024-04-12 18:34:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:34:33.053318059 +0000 UTC m=+48.370045218" watchObservedRunningTime="2024-04-12 18:34:33.071385254 +0000 UTC m=+48.388112373" Apr 12 18:34:33.066000 audit[3986]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:33.066000 audit[3986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc9120310 a2=0 a3=1 items=0 ppid=2590 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:33.098000 audit[3989]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:33.098000 audit[3989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd2508300 a2=0 a3=1 items=0 ppid=2590 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:33.104000 audit[3989]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:33.104000 audit[3989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd2508300 a2=0 a3=1 items=0 ppid=2590 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:33.144323 systemd-networkd[1481]: calif3b1eecc6a2: Link UP Apr 12 18:34:33.158628 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:33.158723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3b1eecc6a2: link becomes ready Apr 12 18:34:33.159820 systemd-networkd[1481]: calif3b1eecc6a2: Gained carrier Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.031 [INFO][3968] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0 calico-kube-controllers-5f689f6cc7- calico-system adac8183-817e-4cf8-93b3-8f7fd9dfbfe7 738 0 2024-04-12 18:34:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5f689f6cc7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 calico-kube-controllers-5f689f6cc7-47s8j eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif3b1eecc6a2 [] []}} ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.031 [INFO][3968] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.082 [INFO][3980] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" HandleID="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.096 [INFO][3980] ipam_plugin.go 268: Auto assigning IP ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" HandleID="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f6a90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-7076f33771", "pod":"calico-kube-controllers-5f689f6cc7-47s8j", "timestamp":"2024-04-12 18:34:33.082968761 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.097 [INFO][3980] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.097 [INFO][3980] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.097 [INFO][3980] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.099 [INFO][3980] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.105 [INFO][3980] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.111 [INFO][3980] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.123 [INFO][3980] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.127 [INFO][3980] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.127 [INFO][3980] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.129 [INFO][3980] ipam.go 1682: Creating new handle: k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.134 [INFO][3980] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.139 [INFO][3980] ipam.go 1216: Successfully claimed IPs: [192.168.3.195/26] block=192.168.3.192/26 handle="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.139 [INFO][3980] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.195/26] handle="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.139 [INFO][3980] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:33.170856 env[1336]: 2024-04-12 18:34:33.139 [INFO][3980] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.195/26] IPv6=[] ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" HandleID="k8s-pod-network.73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.140 [INFO][3968] k8s.go 385: Populated endpoint ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0", GenerateName:"calico-kube-controllers-5f689f6cc7-", Namespace:"calico-system", SelfLink:"", UID:"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f689f6cc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"calico-kube-controllers-5f689f6cc7-47s8j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3b1eecc6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.141 [INFO][3968] k8s.go 386: Calico CNI using IPs: [192.168.3.195/32] ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.141 [INFO][3968] dataplane_linux.go 68: Setting the host side veth name to calif3b1eecc6a2 ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.159 [INFO][3968] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.160 [INFO][3968] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0", GenerateName:"calico-kube-controllers-5f689f6cc7-", Namespace:"calico-system", SelfLink:"", UID:"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f689f6cc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d", Pod:"calico-kube-controllers-5f689f6cc7-47s8j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3b1eecc6a2", MAC:"ce:41:74:d0:f9:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:33.171513 env[1336]: 2024-04-12 18:34:33.169 [INFO][3968] k8s.go 498: Wrote updated endpoint to datastore ContainerID="73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d" Namespace="calico-system" Pod="calico-kube-controllers-5f689f6cc7-47s8j" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:33.194751 env[1336]: time="2024-04-12T18:34:33.194664431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:33.194751 env[1336]: time="2024-04-12T18:34:33.194712508Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:33.194959 env[1336]: time="2024-04-12T18:34:33.194722947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:33.195138 env[1336]: time="2024-04-12T18:34:33.195108041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d pid=4012 runtime=io.containerd.runc.v2 Apr 12 18:34:33.212507 systemd[1]: Started cri-containerd-73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d.scope. Apr 12 18:34:33.208000 audit[4028]: NETFILTER_CFG table=filter:114 family=2 entries=44 op=nft_register_chain pid=4028 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:33.208000 audit[4028]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22780 a0=3 a1=fffff0070c80 a2=0 a3=ffffba637fa8 items=0 ppid=3479 pid=4028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.208000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.226000 audit: BPF prog-id=166 op=LOAD Apr 12 18:34:33.227000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.227000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4012 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333432613331343165326262666661623734636437613962656436 Apr 12 18:34:33.227000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.227000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4012 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333432613331343165326262666661623734636437613962656436 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit: BPF prog-id=167 op=LOAD Apr 12 18:34:33.228000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4012 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333432613331343165326262666661623734636437613962656436 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.228000 audit: BPF prog-id=168 op=LOAD Apr 12 18:34:33.228000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4012 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333432613331343165326262666661623734636437613962656436 Apr 12 18:34:33.229000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:34:33.229000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:33.229000 audit: BPF prog-id=169 op=LOAD Apr 12 18:34:33.229000 audit[4022]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4012 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:33.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733333432613331343165326262666661623734636437613962656436 Apr 12 18:34:33.250216 env[1336]: time="2024-04-12T18:34:33.250174328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f689f6cc7-47s8j,Uid:adac8183-817e-4cf8-93b3-8f7fd9dfbfe7,Namespace:calico-system,Attempt:1,} returns sandbox id \"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d\"" Apr 12 18:34:33.252345 env[1336]: time="2024-04-12T18:34:33.252310146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:34:33.395439 systemd-networkd[1481]: calibb70b666ffb: Gained IPv6LL Apr 12 18:34:33.820764 env[1336]: time="2024-04-12T18:34:33.820722032Z" level=info msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.873 [INFO][4061] k8s.go 585: Cleaning up netns ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.873 [INFO][4061] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" iface="eth0" netns="/var/run/netns/cni-31331fa5-ed25-448e-21d5-0d8aa0b594e1" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.873 [INFO][4061] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" iface="eth0" netns="/var/run/netns/cni-31331fa5-ed25-448e-21d5-0d8aa0b594e1" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.873 [INFO][4061] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" iface="eth0" netns="/var/run/netns/cni-31331fa5-ed25-448e-21d5-0d8aa0b594e1" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.873 [INFO][4061] k8s.go 592: Releasing IP address(es) ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.876 [INFO][4061] utils.go 188: Calico CNI releasing IP address ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.894 [INFO][4067] ipam_plugin.go 415: Releasing address using handleID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.895 [INFO][4067] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.895 [INFO][4067] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.903 [WARNING][4067] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.903 [INFO][4067] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.907 [INFO][4067] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:33.910978 env[1336]: 2024-04-12 18:34:33.909 [INFO][4061] k8s.go 598: Teardown processing complete. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:33.914280 env[1336]: time="2024-04-12T18:34:33.914225596Z" level=info msg="TearDown network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" successfully" Apr 12 18:34:33.914499 env[1336]: time="2024-04-12T18:34:33.914475619Z" level=info msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" returns successfully" Apr 12 18:34:33.916836 systemd[1]: run-netns-cni\x2d31331fa5\x2ded25\x2d448e\x2d21d5\x2d0d8aa0b594e1.mount: Deactivated successfully. Apr 12 18:34:33.918926 env[1336]: time="2024-04-12T18:34:33.918879845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zv96,Uid:4aa58e7f-5556-4245-abd0-59216f6bf8aa,Namespace:calico-system,Attempt:1,}" Apr 12 18:34:34.995518 systemd-networkd[1481]: calif3b1eecc6a2: Gained IPv6LL Apr 12 18:34:35.164636 systemd-networkd[1481]: calicc3b1192272: Link UP Apr 12 18:34:35.178798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:35.178923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc3b1192272: link becomes ready Apr 12 18:34:35.181413 systemd-networkd[1481]: calicc3b1192272: Gained carrier Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.084 [INFO][4074] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0 csi-node-driver- calico-system 4aa58e7f-5556-4245-abd0-59216f6bf8aa 754 0 2024-04-12 18:34:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 csi-node-driver-5zv96 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calicc3b1192272 [] []}} ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.084 [INFO][4074] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.111 [INFO][4087] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" HandleID="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.125 [INFO][4087] ipam_plugin.go 268: Auto assigning IP ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" HandleID="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef590), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-7076f33771", "pod":"csi-node-driver-5zv96", "timestamp":"2024-04-12 18:34:35.111855788 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.125 [INFO][4087] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.125 [INFO][4087] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.125 [INFO][4087] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.127 [INFO][4087] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.132 [INFO][4087] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.139 [INFO][4087] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.141 [INFO][4087] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.143 [INFO][4087] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.143 [INFO][4087] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.145 [INFO][4087] ipam.go 1682: Creating new handle: k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7 Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.149 [INFO][4087] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.157 [INFO][4087] ipam.go 1216: Successfully claimed IPs: [192.168.3.196/26] block=192.168.3.192/26 handle="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.157 [INFO][4087] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.196/26] handle="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.157 [INFO][4087] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:35.194480 env[1336]: 2024-04-12 18:34:35.157 [INFO][4087] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.196/26] IPv6=[] ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" HandleID="k8s-pod-network.596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.159 [INFO][4074] k8s.go 385: Populated endpoint ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aa58e7f-5556-4245-abd0-59216f6bf8aa", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"csi-node-driver-5zv96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicc3b1192272", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.159 [INFO][4074] k8s.go 386: Calico CNI using IPs: [192.168.3.196/32] ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.159 [INFO][4074] dataplane_linux.go 68: Setting the host side veth name to calicc3b1192272 ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.181 [INFO][4074] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.182 [INFO][4074] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aa58e7f-5556-4245-abd0-59216f6bf8aa", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7", Pod:"csi-node-driver-5zv96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicc3b1192272", MAC:"3e:a9:05:58:73:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:35.195284 env[1336]: 2024-04-12 18:34:35.192 [INFO][4074] k8s.go 498: Wrote updated endpoint to datastore ContainerID="596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7" Namespace="calico-system" Pod="csi-node-driver-5zv96" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:35.210983 env[1336]: time="2024-04-12T18:34:35.210913815Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:35.211187 env[1336]: time="2024-04-12T18:34:35.211163439Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:35.211278 env[1336]: time="2024-04-12T18:34:35.211257273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:35.211568 env[1336]: time="2024-04-12T18:34:35.211537374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7 pid=4113 runtime=io.containerd.runc.v2 Apr 12 18:34:35.212000 audit[4122]: NETFILTER_CFG table=filter:115 family=2 entries=42 op=nft_register_chain pid=4122 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:35.212000 audit[4122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffd15f4d00 a2=0 a3=ffffa8f25fa8 items=0 ppid=3479 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.212000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:35.231740 systemd[1]: Started cri-containerd-596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7.scope. Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.252000 audit: BPF prog-id=170 op=LOAD Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=4113 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366166386530353639326239663338373763313566376161343734 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=4113 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366166386530353639326239663338373763313566376161343734 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit: BPF prog-id=171 op=LOAD Apr 12 18:34:35.254000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=4113 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366166386530353639326239663338373763313566376161343734 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit: BPF prog-id=172 op=LOAD Apr 12 18:34:35.254000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=4113 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366166386530353639326239663338373763313566376161343734 Apr 12 18:34:35.254000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:34:35.254000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { perfmon } for pid=4125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit[4125]: AVC avc: denied { bpf } for pid=4125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:35.254000 audit: BPF prog-id=173 op=LOAD Apr 12 18:34:35.254000 audit[4125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=4113 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:35.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539366166386530353639326239663338373763313566376161343734 Apr 12 18:34:35.272710 env[1336]: time="2024-04-12T18:34:35.272659848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5zv96,Uid:4aa58e7f-5556-4245-abd0-59216f6bf8aa,Namespace:calico-system,Attempt:1,} returns sandbox id \"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7\"" Apr 12 18:34:36.025948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3570631923.mount: Deactivated successfully. Apr 12 18:34:36.270444 env[1336]: time="2024-04-12T18:34:36.270383280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:36.281471 env[1336]: time="2024-04-12T18:34:36.281356887Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:36.287510 env[1336]: time="2024-04-12T18:34:36.287466490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:36.297401 env[1336]: time="2024-04-12T18:34:36.297359767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:36.297827 env[1336]: time="2024-04-12T18:34:36.297791579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:34:36.298807 env[1336]: time="2024-04-12T18:34:36.298710759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:34:36.312617 env[1336]: time="2024-04-12T18:34:36.312574858Z" level=info msg="CreateContainer within sandbox \"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:34:36.400436 env[1336]: time="2024-04-12T18:34:36.400370552Z" level=info msg="CreateContainer within sandbox \"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2\"" Apr 12 18:34:36.401320 env[1336]: time="2024-04-12T18:34:36.401261214Z" level=info msg="StartContainer for \"c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2\"" Apr 12 18:34:36.418195 systemd[1]: Started cri-containerd-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2.scope. Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.440000 audit: BPF prog-id=174 op=LOAD Apr 12 18:34:36.441000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.441000 audit[4157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4012 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313232303161616238313039386461386265643830383232653066 Apr 12 18:34:36.441000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.441000 audit[4157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4012 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313232303161616238313039386461386265643830383232653066 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.442000 audit: BPF prog-id=175 op=LOAD Apr 12 18:34:36.442000 audit[4157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4012 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313232303161616238313039386461386265643830383232653066 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.443000 audit: BPF prog-id=176 op=LOAD Apr 12 18:34:36.443000 audit[4157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4012 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313232303161616238313039386461386265643830383232653066 Apr 12 18:34:36.443000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:34:36.443000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:36.444000 audit: BPF prog-id=177 op=LOAD Apr 12 18:34:36.444000 audit[4157]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4012 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:36.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334313232303161616238313039386461386265643830383232653066 Apr 12 18:34:36.476314 env[1336]: time="2024-04-12T18:34:36.476219302Z" level=info msg="StartContainer for \"c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2\" returns successfully" Apr 12 18:34:36.659477 systemd-networkd[1481]: calicc3b1192272: Gained IPv6LL Apr 12 18:34:37.088526 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.kHvEOk.mount: Deactivated successfully. Apr 12 18:34:37.132688 kubelet[2459]: I0412 18:34:37.132159 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5f689f6cc7-47s8j" podStartSLOduration=27.085632576 podCreationTimestamp="2024-04-12 18:34:07 +0000 UTC" firstStartedPulling="2024-04-12 18:34:33.251662509 +0000 UTC m=+48.568389668" lastFinishedPulling="2024-04-12 18:34:36.298145756 +0000 UTC m=+51.614872915" observedRunningTime="2024-04-12 18:34:37.078410405 +0000 UTC m=+52.395137564" watchObservedRunningTime="2024-04-12 18:34:37.132115823 +0000 UTC m=+52.448842982" Apr 12 18:34:38.011552 env[1336]: time="2024-04-12T18:34:38.011495463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.021915 env[1336]: time="2024-04-12T18:34:38.021861720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.028677 env[1336]: time="2024-04-12T18:34:38.028627848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.046499 env[1336]: time="2024-04-12T18:34:38.046447988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:38.047139 env[1336]: time="2024-04-12T18:34:38.047107066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:34:38.049533 env[1336]: time="2024-04-12T18:34:38.049496473Z" level=info msg="CreateContainer within sandbox \"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:34:38.133179 env[1336]: time="2024-04-12T18:34:38.133111647Z" level=info msg="CreateContainer within sandbox \"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6138d523dc48a4e26794629705ea3dc7ee7142d837bd7252e8003fb08aab8632\"" Apr 12 18:34:38.133728 env[1336]: time="2024-04-12T18:34:38.133700049Z" level=info msg="StartContainer for \"6138d523dc48a4e26794629705ea3dc7ee7142d837bd7252e8003fb08aab8632\"" Apr 12 18:34:38.163283 systemd[1]: run-containerd-runc-k8s.io-6138d523dc48a4e26794629705ea3dc7ee7142d837bd7252e8003fb08aab8632-runc.cHPDZE.mount: Deactivated successfully. Apr 12 18:34:38.166853 systemd[1]: Started cri-containerd-6138d523dc48a4e26794629705ea3dc7ee7142d837bd7252e8003fb08aab8632.scope. Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.204318 kernel: kauditd_printk_skb: 296 callbacks suppressed Apr 12 18:34:38.204441 kernel: audit: type=1400 audit(1712946878.198:1303): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4113 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.248053 kernel: audit: type=1300 audit(1712946878.198:1303): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4113 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333864353233646334386134653236373934363239373035656133 Apr 12 18:34:38.273755 kernel: audit: type=1327 audit(1712946878.198:1303): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333864353233646334386134653236373934363239373035656133 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.288126 env[1336]: time="2024-04-12T18:34:38.288075258Z" level=info msg="StartContainer for \"6138d523dc48a4e26794629705ea3dc7ee7142d837bd7252e8003fb08aab8632\" returns successfully" Apr 12 18:34:38.289988 env[1336]: time="2024-04-12T18:34:38.289935459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:34:38.293272 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.310832 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.329902 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.347338 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.365091 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.365244 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.403554 kernel: audit: type=1400 audit(1712946878.198:1304): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit: BPF prog-id=178 op=LOAD Apr 12 18:34:38.198000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4113 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333864353233646334386134653236373934363239373035656133 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit: BPF prog-id=179 op=LOAD Apr 12 18:34:38.198000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4113 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333864353233646334386134653236373934363239373035656133 Apr 12 18:34:38.198000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:34:38.198000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:38.198000 audit: BPF prog-id=180 op=LOAD Apr 12 18:34:38.198000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4113 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631333864353233646334386134653236373934363239373035656133 Apr 12 18:34:40.336250 env[1336]: time="2024-04-12T18:34:40.335355578Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:40.343103 env[1336]: time="2024-04-12T18:34:40.343061773Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:40.347625 env[1336]: time="2024-04-12T18:34:40.347575888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:40.352971 env[1336]: time="2024-04-12T18:34:40.352928551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:40.353484 env[1336]: time="2024-04-12T18:34:40.353444999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:34:40.355527 env[1336]: time="2024-04-12T18:34:40.355494950Z" level=info msg="CreateContainer within sandbox \"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:34:40.407616 env[1336]: time="2024-04-12T18:34:40.407568271Z" level=info msg="CreateContainer within sandbox \"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9f256fc753337e51d8679cf0b9e60755644226fd5f12d0ce100c4464691f306d\"" Apr 12 18:34:40.408341 env[1336]: time="2024-04-12T18:34:40.408263308Z" level=info msg="StartContainer for \"9f256fc753337e51d8679cf0b9e60755644226fd5f12d0ce100c4464691f306d\"" Apr 12 18:34:40.434347 systemd[1]: run-containerd-runc-k8s.io-9f256fc753337e51d8679cf0b9e60755644226fd5f12d0ce100c4464691f306d-runc.vwvgLX.mount: Deactivated successfully. Apr 12 18:34:40.437892 systemd[1]: Started cri-containerd-9f256fc753337e51d8679cf0b9e60755644226fd5f12d0ce100c4464691f306d.scope. Apr 12 18:34:40.456000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.456000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4113 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:40.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323536666337353333333765353164383637396366306239653630 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit: BPF prog-id=181 op=LOAD Apr 12 18:34:40.457000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4113 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:40.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323536666337353333333765353164383637396366306239653630 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.457000 audit: BPF prog-id=182 op=LOAD Apr 12 18:34:40.457000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4113 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:40.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323536666337353333333765353164383637396366306239653630 Apr 12 18:34:40.458000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:34:40.458000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:40.458000 audit: BPF prog-id=183 op=LOAD Apr 12 18:34:40.458000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4113 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:40.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323536666337353333333765353164383637396366306239653630 Apr 12 18:34:40.482395 env[1336]: time="2024-04-12T18:34:40.482332084Z" level=info msg="StartContainer for \"9f256fc753337e51d8679cf0b9e60755644226fd5f12d0ce100c4464691f306d\" returns successfully" Apr 12 18:34:40.804000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.804000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=401483a990 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.805000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.805000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=401483a9f0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.840000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.840000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400d90ef20 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.864749 kubelet[2459]: I0412 18:34:40.864718 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:40.870398 systemd[1]: Created slice kubepods-besteffort-podcf5dc23c_3318_40cf_841b_5cb907093b44.slice. Apr 12 18:34:40.901819 kubelet[2459]: I0412 18:34:40.901775 2459 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:34:40.915129 systemd[1]: Created slice kubepods-besteffort-pod9e2c16f6_10a9_4322_bf9d_268cded753a3.slice. Apr 12 18:34:40.952000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.952000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4013b77740 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.952000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.952000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40116ebc40 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.952000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:40.952000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4013b77950 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:34:40.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:40.999000 audit[4322]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4322 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:41.000847 kubelet[2459]: I0412 18:34:41.000818 2459 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:34:41.000915 kubelet[2459]: I0412 18:34:41.000853 2459 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:34:40.999000 audit[4322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe3ebd170 a2=0 a3=1 items=0 ppid=2590 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:40.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:41.005000 audit[4322]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4322 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:41.005000 audit[4322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe3ebd170 a2=0 a3=1 items=0 ppid=2590 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:41.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:41.019000 audit[4324]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:41.019000 audit[4324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffb26dc60 a2=0 a3=1 items=0 ppid=2590 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:41.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:41.022000 audit[4324]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:41.022000 audit[4324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffb26dc60 a2=0 a3=1 items=0 ppid=2590 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:41.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:41.058287 kubelet[2459]: I0412 18:34:41.058191 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-npf6q\" (UniqueName: \"kubernetes.io/projected/cf5dc23c-3318-40cf-841b-5cb907093b44-kube-api-access-npf6q\") pod \"calico-apiserver-6fbc56b784-2v7v4\" (UID: \"cf5dc23c-3318-40cf-841b-5cb907093b44\") " pod="calico-apiserver/calico-apiserver-6fbc56b784-2v7v4" Apr 12 18:34:41.058502 kubelet[2459]: I0412 18:34:41.058488 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9e2c16f6-10a9-4322-bf9d-268cded753a3-calico-apiserver-certs\") pod \"calico-apiserver-6fbc56b784-98sct\" (UID: \"9e2c16f6-10a9-4322-bf9d-268cded753a3\") " pod="calico-apiserver/calico-apiserver-6fbc56b784-98sct" Apr 12 18:34:41.058602 kubelet[2459]: I0412 18:34:41.058592 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cf5dc23c-3318-40cf-841b-5cb907093b44-calico-apiserver-certs\") pod \"calico-apiserver-6fbc56b784-2v7v4\" (UID: \"cf5dc23c-3318-40cf-841b-5cb907093b44\") " pod="calico-apiserver/calico-apiserver-6fbc56b784-2v7v4" Apr 12 18:34:41.058701 kubelet[2459]: I0412 18:34:41.058692 2459 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r45xp\" (UniqueName: \"kubernetes.io/projected/9e2c16f6-10a9-4322-bf9d-268cded753a3-kube-api-access-r45xp\") pod \"calico-apiserver-6fbc56b784-98sct\" (UID: \"9e2c16f6-10a9-4322-bf9d-268cded753a3\") " pod="calico-apiserver/calico-apiserver-6fbc56b784-98sct" Apr 12 18:34:41.159689 kubelet[2459]: E0412 18:34:41.159656 2459 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:34:41.160199 kubelet[2459]: E0412 18:34:41.160174 2459 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cf5dc23c-3318-40cf-841b-5cb907093b44-calico-apiserver-certs podName:cf5dc23c-3318-40cf-841b-5cb907093b44 nodeName:}" failed. No retries permitted until 2024-04-12 18:34:41.660155845 +0000 UTC m=+56.976882964 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/cf5dc23c-3318-40cf-841b-5cb907093b44-calico-apiserver-certs") pod "calico-apiserver-6fbc56b784-2v7v4" (UID: "cf5dc23c-3318-40cf-841b-5cb907093b44") : secret "calico-apiserver-certs" not found Apr 12 18:34:41.160283 kubelet[2459]: E0412 18:34:41.160050 2459 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:34:41.160384 kubelet[2459]: E0412 18:34:41.160363 2459 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/9e2c16f6-10a9-4322-bf9d-268cded753a3-calico-apiserver-certs podName:9e2c16f6-10a9-4322-bf9d-268cded753a3 nodeName:}" failed. No retries permitted until 2024-04-12 18:34:41.660289717 +0000 UTC m=+56.977016836 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/9e2c16f6-10a9-4322-bf9d-268cded753a3-calico-apiserver-certs") pod "calico-apiserver-6fbc56b784-98sct" (UID: "9e2c16f6-10a9-4322-bf9d-268cded753a3") : secret "calico-apiserver-certs" not found Apr 12 18:34:41.774978 env[1336]: time="2024-04-12T18:34:41.774622129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbc56b784-2v7v4,Uid:cf5dc23c-3318-40cf-841b-5cb907093b44,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:34:41.819139 env[1336]: time="2024-04-12T18:34:41.819096709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbc56b784-98sct,Uid:9e2c16f6-10a9-4322-bf9d-268cded753a3,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:34:42.029567 systemd-networkd[1481]: cali1953c4baeb4: Link UP Apr 12 18:34:42.041370 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:42.041714 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1953c4baeb4: link becomes ready Apr 12 18:34:42.042000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:42.042000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:42.042000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ade620 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:42.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:42.042000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40013176b0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:42.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:42.053605 systemd-networkd[1481]: cali1953c4baeb4: Gained carrier Apr 12 18:34:42.062085 kubelet[2459]: I0412 18:34:42.061879 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5zv96" podStartSLOduration=29.982305375 podCreationTimestamp="2024-04-12 18:34:07 +0000 UTC" firstStartedPulling="2024-04-12 18:34:35.274224305 +0000 UTC m=+50.590951464" lastFinishedPulling="2024-04-12 18:34:40.353757699 +0000 UTC m=+55.670484858" observedRunningTime="2024-04-12 18:34:41.082927151 +0000 UTC m=+56.399654310" watchObservedRunningTime="2024-04-12 18:34:42.061838769 +0000 UTC m=+57.378565928" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.895 [INFO][4329] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0 calico-apiserver-6fbc56b784- calico-apiserver cf5dc23c-3318-40cf-841b-5cb907093b44 834 0 2024-04-12 18:34:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fbc56b784 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 calico-apiserver-6fbc56b784-2v7v4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1953c4baeb4 [] []}} ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.895 [INFO][4329] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.940 [INFO][4351] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" HandleID="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.956 [INFO][4351] ipam_plugin.go 268: Auto assigning IP ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" HandleID="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f7190), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-7076f33771", "pod":"calico-apiserver-6fbc56b784-2v7v4", "timestamp":"2024-04-12 18:34:41.940657713 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.956 [INFO][4351] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.956 [INFO][4351] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.956 [INFO][4351] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.959 [INFO][4351] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.970 [INFO][4351] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.979 [INFO][4351] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.983 [INFO][4351] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.989 [INFO][4351] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.989 [INFO][4351] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.992 [INFO][4351] ipam.go 1682: Creating new handle: k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66 Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:41.997 [INFO][4351] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:42.021 [INFO][4351] ipam.go 1216: Successfully claimed IPs: [192.168.3.197/26] block=192.168.3.192/26 handle="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:42.021 [INFO][4351] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.197/26] handle="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:42.021 [INFO][4351] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:42.064113 env[1336]: 2024-04-12 18:34:42.021 [INFO][4351] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.197/26] IPv6=[] ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" HandleID="k8s-pod-network.c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.023 [INFO][4329] k8s.go 385: Populated endpoint ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0", GenerateName:"calico-apiserver-6fbc56b784-", Namespace:"calico-apiserver", SelfLink:"", UID:"cf5dc23c-3318-40cf-841b-5cb907093b44", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbc56b784", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"calico-apiserver-6fbc56b784-2v7v4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1953c4baeb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.023 [INFO][4329] k8s.go 386: Calico CNI using IPs: [192.168.3.197/32] ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.023 [INFO][4329] dataplane_linux.go 68: Setting the host side veth name to cali1953c4baeb4 ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.054 [INFO][4329] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.054 [INFO][4329] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0", GenerateName:"calico-apiserver-6fbc56b784-", Namespace:"calico-apiserver", SelfLink:"", UID:"cf5dc23c-3318-40cf-841b-5cb907093b44", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbc56b784", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66", Pod:"calico-apiserver-6fbc56b784-2v7v4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1953c4baeb4", MAC:"82:08:e4:2a:0e:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:42.064778 env[1336]: 2024-04-12 18:34:42.062 [INFO][4329] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-2v7v4" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--2v7v4-eth0" Apr 12 18:34:42.102366 systemd-networkd[1481]: cali3817ec1c0a9: Link UP Apr 12 18:34:42.110453 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3817ec1c0a9: link becomes ready Apr 12 18:34:42.112481 systemd-networkd[1481]: cali3817ec1c0a9: Gained carrier Apr 12 18:34:42.128000 audit[4387]: NETFILTER_CFG table=filter:120 family=2 entries=59 op=nft_register_chain pid=4387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:42.128000 audit[4387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=fffffa58e190 a2=0 a3=ffffbe34cfa8 items=0 ppid=3479 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:41.948 [INFO][4342] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0 calico-apiserver-6fbc56b784- calico-apiserver 9e2c16f6-10a9-4322-bf9d-268cded753a3 836 0 2024-04-12 18:34:40 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fbc56b784 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-7076f33771 calico-apiserver-6fbc56b784-98sct eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3817ec1c0a9 [] []}} ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:41.948 [INFO][4342] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.005 [INFO][4360] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" HandleID="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.025 [INFO][4360] ipam_plugin.go 268: Auto assigning IP ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" HandleID="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000272d70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-7076f33771", "pod":"calico-apiserver-6fbc56b784-98sct", "timestamp":"2024-04-12 18:34:42.005456506 +0000 UTC"}, Hostname:"ci-3510.3.3-a-7076f33771", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.025 [INFO][4360] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.025 [INFO][4360] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.025 [INFO][4360] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-7076f33771' Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.043 [INFO][4360] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.054 [INFO][4360] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.067 [INFO][4360] ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.074 [INFO][4360] ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.077 [INFO][4360] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.077 [INFO][4360] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.079 [INFO][4360] ipam.go 1682: Creating new handle: k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.085 [INFO][4360] ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.091 [INFO][4360] ipam.go 1216: Successfully claimed IPs: [192.168.3.198/26] block=192.168.3.192/26 handle="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.091 [INFO][4360] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.198/26] handle="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" host="ci-3510.3.3-a-7076f33771" Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.091 [INFO][4360] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:42.134055 env[1336]: 2024-04-12 18:34:42.091 [INFO][4360] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.3.198/26] IPv6=[] ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" HandleID="k8s-pod-network.c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.093 [INFO][4342] k8s.go 385: Populated endpoint ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0", GenerateName:"calico-apiserver-6fbc56b784-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e2c16f6-10a9-4322-bf9d-268cded753a3", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbc56b784", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"", Pod:"calico-apiserver-6fbc56b784-98sct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3817ec1c0a9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.093 [INFO][4342] k8s.go 386: Calico CNI using IPs: [192.168.3.198/32] ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.093 [INFO][4342] dataplane_linux.go 68: Setting the host side veth name to cali3817ec1c0a9 ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.116 [INFO][4342] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.116 [INFO][4342] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0", GenerateName:"calico-apiserver-6fbc56b784-", Namespace:"calico-apiserver", SelfLink:"", UID:"9e2c16f6-10a9-4322-bf9d-268cded753a3", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fbc56b784", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e", Pod:"calico-apiserver-6fbc56b784-98sct", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3817ec1c0a9", MAC:"d6:9b:f3:b0:60:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:42.134664 env[1336]: 2024-04-12 18:34:42.132 [INFO][4342] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e" Namespace="calico-apiserver" Pod="calico-apiserver-6fbc56b784-98sct" WorkloadEndpoint="ci--3510.3.3--a--7076f33771-k8s-calico--apiserver--6fbc56b784--98sct-eth0" Apr 12 18:34:42.128000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:42.162000 audit[4399]: NETFILTER_CFG table=filter:121 family=2 entries=50 op=nft_register_chain pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:42.162000 audit[4399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25080 a0=3 a1=ffffc38432f0 a2=0 a3=ffff88051fa8 items=0 ppid=3479 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.162000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:42.329090 env[1336]: time="2024-04-12T18:34:42.328934120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:42.329090 env[1336]: time="2024-04-12T18:34:42.329045673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:42.330601 env[1336]: time="2024-04-12T18:34:42.329074431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:42.330904 env[1336]: time="2024-04-12T18:34:42.330804484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66 pid=4407 runtime=io.containerd.runc.v2 Apr 12 18:34:42.337597 env[1336]: time="2024-04-12T18:34:42.337536306Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:42.337784 env[1336]: time="2024-04-12T18:34:42.337759733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:42.337887 env[1336]: time="2024-04-12T18:34:42.337865606Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:42.338124 env[1336]: time="2024-04-12T18:34:42.338094112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e pid=4424 runtime=io.containerd.runc.v2 Apr 12 18:34:42.345150 systemd[1]: Started cri-containerd-c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66.scope. Apr 12 18:34:42.366047 systemd[1]: Started cri-containerd-c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e.scope. Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit: BPF prog-id=184 op=LOAD Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4407 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333333561663162363738396430656664303038623964643136616261 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4407 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333333561663162363738396430656664303038623964643136616261 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.371000 audit: BPF prog-id=185 op=LOAD Apr 12 18:34:42.371000 audit[4421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4407 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333333561663162363738396430656664303038623964643136616261 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit: BPF prog-id=186 op=LOAD Apr 12 18:34:42.372000 audit[4421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4407 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333333561663162363738396430656664303038623964643136616261 Apr 12 18:34:42.372000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:34:42.372000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { perfmon } for pid=4421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit[4421]: AVC avc: denied { bpf } for pid=4421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.372000 audit: BPF prog-id=187 op=LOAD Apr 12 18:34:42.372000 audit[4421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4407 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333333561663162363738396430656664303038623964643136616261 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.396000 audit: BPF prog-id=188 op=LOAD Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4424 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338633233356332336136353434633233343564613365613638613436 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4424 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338633233356332336136353434633233343564613365613638613436 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit: BPF prog-id=189 op=LOAD Apr 12 18:34:42.397000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4424 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338633233356332336136353434633233343564613365613638613436 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit: BPF prog-id=190 op=LOAD Apr 12 18:34:42.397000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4424 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338633233356332336136353434633233343564613365613638613436 Apr 12 18:34:42.397000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:34:42.397000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:42.397000 audit: BPF prog-id=191 op=LOAD Apr 12 18:34:42.397000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4424 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:42.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338633233356332336136353434633233343564613365613638613436 Apr 12 18:34:42.418162 env[1336]: time="2024-04-12T18:34:42.418095269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbc56b784-2v7v4,Uid:cf5dc23c-3318-40cf-841b-5cb907093b44,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66\"" Apr 12 18:34:42.430803 env[1336]: time="2024-04-12T18:34:42.430764763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:34:42.433592 env[1336]: time="2024-04-12T18:34:42.431119261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fbc56b784-98sct,Uid:9e2c16f6-10a9-4322-bf9d-268cded753a3,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e\"" Apr 12 18:34:43.507458 systemd-networkd[1481]: cali3817ec1c0a9: Gained IPv6LL Apr 12 18:34:43.623843 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3807818596.mount: Deactivated successfully. Apr 12 18:34:43.891478 systemd-networkd[1481]: cali1953c4baeb4: Gained IPv6LL Apr 12 18:34:44.573423 env[1336]: time="2024-04-12T18:34:44.573375549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:44.584742 env[1336]: time="2024-04-12T18:34:44.584694777Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:44.590966 env[1336]: time="2024-04-12T18:34:44.590925196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:44.601040 env[1336]: time="2024-04-12T18:34:44.600995580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:44.601822 env[1336]: time="2024-04-12T18:34:44.601796411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:34:44.603181 env[1336]: time="2024-04-12T18:34:44.603154008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:34:44.604720 env[1336]: time="2024-04-12T18:34:44.604689834Z" level=info msg="CreateContainer within sandbox \"c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:34:44.670172 env[1336]: time="2024-04-12T18:34:44.670124992Z" level=info msg="CreateContainer within sandbox \"c335af1b6789d0efd008b9dd16aba7c34fd669c2557d50ca9849baf4afb0ca66\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e\"" Apr 12 18:34:44.671022 env[1336]: time="2024-04-12T18:34:44.670993779Z" level=info msg="StartContainer for \"764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e\"" Apr 12 18:34:44.695406 systemd[1]: Started cri-containerd-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e.scope. Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.727492 kernel: kauditd_printk_skb: 232 callbacks suppressed Apr 12 18:34:44.727630 kernel: audit: type=1400 audit(1712946884.720:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.764146 kernel: audit: type=1400 audit(1712946884.720:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.767098 kernel: audit: type=1400 audit(1712946884.720:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.781220 env[1336]: time="2024-04-12T18:34:44.781115043Z" level=info msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.801384 kernel: audit: type=1400 audit(1712946884.720:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.822749 kernel: audit: type=1400 audit(1712946884.720:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.822884 kernel: audit: type=1400 audit(1712946884.720:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.867312 kernel: audit: type=1400 audit(1712946884.720:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.886763 kernel: audit: type=1400 audit(1712946884.720:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.910117 kernel: audit: type=1400 audit(1712946884.720:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.930374 kernel: audit: type=1400 audit(1712946884.721:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.721000 audit: BPF prog-id=192 op=LOAD Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4407 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:44.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346462623364363363663464363630353636616562393063643164 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4407 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:44.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346462623364363363663464363630353636616562393063643164 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.736000 audit: BPF prog-id=193 op=LOAD Apr 12 18:34:44.736000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4407 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:44.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346462623364363363663464363630353636616562393063643164 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.743000 audit: BPF prog-id=194 op=LOAD Apr 12 18:34:44.743000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4407 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:44.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346462623364363363663464363630353636616562393063643164 Apr 12 18:34:44.766000 audit: BPF prog-id=194 op=UNLOAD Apr 12 18:34:44.766000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { perfmon } for pid=4491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit[4491]: AVC avc: denied { bpf } for pid=4491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:44.766000 audit: BPF prog-id=195 op=LOAD Apr 12 18:34:44.766000 audit[4491]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4407 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:44.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346462623364363363663464363630353636616562393063643164 Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.855 [WARNING][4522] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3847564-3c94-4e26-9e4b-f5292e262961", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73", Pod:"coredns-5d78c9869d-zr2bv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb70b666ffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.855 [INFO][4522] k8s.go 585: Cleaning up netns ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.855 [INFO][4522] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" iface="eth0" netns="" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.855 [INFO][4522] k8s.go 592: Releasing IP address(es) ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.855 [INFO][4522] utils.go 188: Calico CNI releasing IP address ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.956 [INFO][4530] ipam_plugin.go 415: Releasing address using handleID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.956 [INFO][4530] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.956 [INFO][4530] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.966 [WARNING][4530] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.967 [INFO][4530] ipam_plugin.go 443: Releasing address using workloadID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.968 [INFO][4530] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:44.971073 env[1336]: 2024-04-12 18:34:44.969 [INFO][4522] k8s.go 598: Teardown processing complete. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:44.971781 env[1336]: time="2024-04-12T18:34:44.971735424Z" level=info msg="TearDown network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" successfully" Apr 12 18:34:44.971858 env[1336]: time="2024-04-12T18:34:44.971841138Z" level=info msg="StopPodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" returns successfully" Apr 12 18:34:44.972532 env[1336]: time="2024-04-12T18:34:44.972505137Z" level=info msg="RemovePodSandbox for \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" Apr 12 18:34:44.972846 env[1336]: time="2024-04-12T18:34:44.972783800Z" level=info msg="Forcibly stopping sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\"" Apr 12 18:34:45.032249 env[1336]: time="2024-04-12T18:34:45.032184699Z" level=info msg="StartContainer for \"764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e\" returns successfully" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.024 [WARNING][4559] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"d3847564-3c94-4e26-9e4b-f5292e262961", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"141ee6c50dfb1377cb54a9da8ec25b3c4801e85389cc60c62f0e2f6db547cb73", Pod:"coredns-5d78c9869d-zr2bv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibb70b666ffb", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.029 [INFO][4559] k8s.go 585: Cleaning up netns ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.029 [INFO][4559] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" iface="eth0" netns="" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.029 [INFO][4559] k8s.go 592: Releasing IP address(es) ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.029 [INFO][4559] utils.go 188: Calico CNI releasing IP address ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.062 [INFO][4565] ipam_plugin.go 415: Releasing address using handleID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.062 [INFO][4565] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.063 [INFO][4565] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.083 [WARNING][4565] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.083 [INFO][4565] ipam_plugin.go 443: Releasing address using workloadID ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" HandleID="k8s-pod-network.adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zr2bv-eth0" Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.086 [INFO][4565] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.090818 env[1336]: 2024-04-12 18:34:45.089 [INFO][4559] k8s.go 598: Teardown processing complete. ContainerID="adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe" Apr 12 18:34:45.099501 env[1336]: time="2024-04-12T18:34:45.099446173Z" level=info msg="TearDown network for sandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" successfully" Apr 12 18:34:45.131030 env[1336]: time="2024-04-12T18:34:45.130906582Z" level=info msg="RemovePodSandbox \"adc9b68ce608b07ecaa5d3968389b47a976cf4f5d37cf5b0a2b4c6400e438bfe\" returns successfully" Apr 12 18:34:45.133132 env[1336]: time="2024-04-12T18:34:45.133085610Z" level=info msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" Apr 12 18:34:45.147612 env[1336]: time="2024-04-12T18:34:45.147552211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:45.157000 audit[4594]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:45.157000 audit[4594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd9c61a50 a2=0 a3=1 items=0 ppid=2590 pid=4594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:45.160061 env[1336]: time="2024-04-12T18:34:45.160026293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:45.164000 audit[4594]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:45.164000 audit[4594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd9c61a50 a2=0 a3=1 items=0 ppid=2590 pid=4594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:45.166779 env[1336]: time="2024-04-12T18:34:45.165400367Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:45.171001 env[1336]: time="2024-04-12T18:34:45.170953429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:45.171429 env[1336]: time="2024-04-12T18:34:45.171264530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:34:45.179475 env[1336]: time="2024-04-12T18:34:45.179413075Z" level=info msg="CreateContainer within sandbox \"c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:34:45.228708 env[1336]: time="2024-04-12T18:34:45.227926008Z" level=info msg="CreateContainer within sandbox \"c8c235c23a6544c2345da3ea68a464c42c8e09249fa2b5b01a7c88e09791193e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9\"" Apr 12 18:34:45.230401 env[1336]: time="2024-04-12T18:34:45.230361700Z" level=info msg="StartContainer for \"e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9\"" Apr 12 18:34:45.252304 systemd[1]: Started cri-containerd-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9.scope. Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.219 [WARNING][4590] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0", GenerateName:"calico-kube-controllers-5f689f6cc7-", Namespace:"calico-system", SelfLink:"", UID:"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f689f6cc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d", Pod:"calico-kube-controllers-5f689f6cc7-47s8j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3b1eecc6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.219 [INFO][4590] k8s.go 585: Cleaning up netns ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.220 [INFO][4590] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" iface="eth0" netns="" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.220 [INFO][4590] k8s.go 592: Releasing IP address(es) ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.220 [INFO][4590] utils.go 188: Calico CNI releasing IP address ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.261 [INFO][4598] ipam_plugin.go 415: Releasing address using handleID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.262 [INFO][4598] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.262 [INFO][4598] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.272 [WARNING][4598] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.272 [INFO][4598] ipam_plugin.go 443: Releasing address using workloadID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.273 [INFO][4598] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.275846 env[1336]: 2024-04-12 18:34:45.274 [INFO][4590] k8s.go 598: Teardown processing complete. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.276481 env[1336]: time="2024-04-12T18:34:45.275885335Z" level=info msg="TearDown network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" successfully" Apr 12 18:34:45.276481 env[1336]: time="2024-04-12T18:34:45.275917533Z" level=info msg="StopPodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" returns successfully" Apr 12 18:34:45.277001 env[1336]: time="2024-04-12T18:34:45.276963629Z" level=info msg="RemovePodSandbox for \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" Apr 12 18:34:45.277075 env[1336]: time="2024-04-12T18:34:45.277006346Z" level=info msg="Forcibly stopping sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\"" Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.294000 audit: BPF prog-id=196 op=LOAD Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4424 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386134323130396365653133643437616362306539626666396261 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4424 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386134323130396365653133643437616362306539626666396261 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit: BPF prog-id=197 op=LOAD Apr 12 18:34:45.295000 audit[4609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4424 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386134323130396365653133643437616362306539626666396261 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit: BPF prog-id=198 op=LOAD Apr 12 18:34:45.295000 audit[4609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4424 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386134323130396365653133643437616362306539626666396261 Apr 12 18:34:45.295000 audit: BPF prog-id=198 op=UNLOAD Apr 12 18:34:45.295000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { perfmon } for pid=4609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit[4609]: AVC avc: denied { bpf } for pid=4609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:45.295000 audit: BPF prog-id=199 op=LOAD Apr 12 18:34:45.295000 audit[4609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4424 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:45.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530386134323130396365653133643437616362306539626666396261 Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.353 [WARNING][4639] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0", GenerateName:"calico-kube-controllers-5f689f6cc7-", Namespace:"calico-system", SelfLink:"", UID:"adac8183-817e-4cf8-93b3-8f7fd9dfbfe7", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f689f6cc7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"73342a3141e2bbffab74cd7a9bed6d3fa0ddcf0321aeca221d5a3365f226dc0d", Pod:"calico-kube-controllers-5f689f6cc7-47s8j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3b1eecc6a2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.354 [INFO][4639] k8s.go 585: Cleaning up netns ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.354 [INFO][4639] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" iface="eth0" netns="" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.354 [INFO][4639] k8s.go 592: Releasing IP address(es) ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.354 [INFO][4639] utils.go 188: Calico CNI releasing IP address ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.375 [INFO][4654] ipam_plugin.go 415: Releasing address using handleID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.375 [INFO][4654] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.375 [INFO][4654] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.385 [WARNING][4654] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.385 [INFO][4654] ipam_plugin.go 443: Releasing address using workloadID ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" HandleID="k8s-pod-network.646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Workload="ci--3510.3.3--a--7076f33771-k8s-calico--kube--controllers--5f689f6cc7--47s8j-eth0" Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.387 [INFO][4654] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.389967 env[1336]: 2024-04-12 18:34:45.388 [INFO][4639] k8s.go 598: Teardown processing complete. ContainerID="646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98" Apr 12 18:34:45.389967 env[1336]: time="2024-04-12T18:34:45.389937126Z" level=info msg="TearDown network for sandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" successfully" Apr 12 18:34:45.416265 env[1336]: time="2024-04-12T18:34:45.416206370Z" level=info msg="StartContainer for \"e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9\" returns successfully" Apr 12 18:34:45.422862 env[1336]: time="2024-04-12T18:34:45.422812249Z" level=info msg="RemovePodSandbox \"646d4eea49d6959b31f284445bafedeb866932d7b60b409fef066d43fc426d98\" returns successfully" Apr 12 18:34:45.423407 env[1336]: time="2024-04-12T18:34:45.423377334Z" level=info msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.472 [WARNING][4675] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aa58e7f-5556-4245-abd0-59216f6bf8aa", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7", Pod:"csi-node-driver-5zv96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicc3b1192272", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.473 [INFO][4675] k8s.go 585: Cleaning up netns ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.473 [INFO][4675] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" iface="eth0" netns="" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.473 [INFO][4675] k8s.go 592: Releasing IP address(es) ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.473 [INFO][4675] utils.go 188: Calico CNI releasing IP address ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.510 [INFO][4683] ipam_plugin.go 415: Releasing address using handleID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.510 [INFO][4683] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.511 [INFO][4683] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.526 [WARNING][4683] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.526 [INFO][4683] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.530 [INFO][4683] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.534507 env[1336]: 2024-04-12 18:34:45.533 [INFO][4675] k8s.go 598: Teardown processing complete. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.534968 env[1336]: time="2024-04-12T18:34:45.534542901Z" level=info msg="TearDown network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" successfully" Apr 12 18:34:45.534968 env[1336]: time="2024-04-12T18:34:45.534573219Z" level=info msg="StopPodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" returns successfully" Apr 12 18:34:45.535604 env[1336]: time="2024-04-12T18:34:45.535580318Z" level=info msg="RemovePodSandbox for \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" Apr 12 18:34:45.535752 env[1336]: time="2024-04-12T18:34:45.535715350Z" level=info msg="Forcibly stopping sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\"" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.586 [WARNING][4703] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4aa58e7f-5556-4245-abd0-59216f6bf8aa", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"596af8e05692b9f3877c15f7aa474ac865f53e21df756d6cdf28d5ced1062dc7", Pod:"csi-node-driver-5zv96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calicc3b1192272", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.587 [INFO][4703] k8s.go 585: Cleaning up netns ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.587 [INFO][4703] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" iface="eth0" netns="" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.588 [INFO][4703] k8s.go 592: Releasing IP address(es) ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.588 [INFO][4703] utils.go 188: Calico CNI releasing IP address ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.614 [INFO][4709] ipam_plugin.go 415: Releasing address using handleID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.615 [INFO][4709] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.615 [INFO][4709] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.625 [WARNING][4709] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.626 [INFO][4709] ipam_plugin.go 443: Releasing address using workloadID ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" HandleID="k8s-pod-network.bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Workload="ci--3510.3.3--a--7076f33771-k8s-csi--node--driver--5zv96-eth0" Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.628 [INFO][4709] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.630236 env[1336]: 2024-04-12 18:34:45.629 [INFO][4703] k8s.go 598: Teardown processing complete. ContainerID="bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498" Apr 12 18:34:45.630855 env[1336]: time="2024-04-12T18:34:45.630264006Z" level=info msg="TearDown network for sandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" successfully" Apr 12 18:34:45.644043 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.kzH8RZ.mount: Deactivated successfully. Apr 12 18:34:45.644782 env[1336]: time="2024-04-12T18:34:45.644734527Z" level=info msg="RemovePodSandbox \"bd877754179c59e3c96999b2ae76aa67667123325083bae6aa3617cff7897498\" returns successfully" Apr 12 18:34:45.646007 env[1336]: time="2024-04-12T18:34:45.645368688Z" level=info msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.685 [WARNING][4728] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bde96c8c-ade0-4f9f-a39c-5a185b074d75", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35", Pod:"coredns-5d78c9869d-zbsh7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45451e08d98", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.686 [INFO][4728] k8s.go 585: Cleaning up netns ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.686 [INFO][4728] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" iface="eth0" netns="" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.686 [INFO][4728] k8s.go 592: Releasing IP address(es) ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.686 [INFO][4728] utils.go 188: Calico CNI releasing IP address ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.705 [INFO][4735] ipam_plugin.go 415: Releasing address using handleID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.705 [INFO][4735] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.705 [INFO][4735] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.714 [WARNING][4735] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.714 [INFO][4735] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.716 [INFO][4735] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.719111 env[1336]: 2024-04-12 18:34:45.717 [INFO][4728] k8s.go 598: Teardown processing complete. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.719111 env[1336]: time="2024-04-12T18:34:45.718741551Z" level=info msg="TearDown network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" successfully" Apr 12 18:34:45.719111 env[1336]: time="2024-04-12T18:34:45.718770909Z" level=info msg="StopPodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" returns successfully" Apr 12 18:34:45.721331 env[1336]: time="2024-04-12T18:34:45.721100448Z" level=info msg="RemovePodSandbox for \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" Apr 12 18:34:45.721331 env[1336]: time="2024-04-12T18:34:45.721141885Z" level=info msg="Forcibly stopping sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\"" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.779 [WARNING][4755] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bde96c8c-ade0-4f9f-a39c-5a185b074d75", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-7076f33771", ContainerID:"899f027ae3f64f2dd4ca184fb23289181d2e782b89d210c061edeab5dab70c35", Pod:"coredns-5d78c9869d-zbsh7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali45451e08d98", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.779 [INFO][4755] k8s.go 585: Cleaning up netns ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.779 [INFO][4755] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" iface="eth0" netns="" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.779 [INFO][4755] k8s.go 592: Releasing IP address(es) ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.779 [INFO][4755] utils.go 188: Calico CNI releasing IP address ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.798 [INFO][4761] ipam_plugin.go 415: Releasing address using handleID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.798 [INFO][4761] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.798 [INFO][4761] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.810 [WARNING][4761] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.811 [INFO][4761] ipam_plugin.go 443: Releasing address using workloadID ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" HandleID="k8s-pod-network.de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Workload="ci--3510.3.3--a--7076f33771-k8s-coredns--5d78c9869d--zbsh7-eth0" Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.813 [INFO][4761] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:45.815904 env[1336]: 2024-04-12 18:34:45.814 [INFO][4755] k8s.go 598: Teardown processing complete. ContainerID="de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406" Apr 12 18:34:45.816403 env[1336]: time="2024-04-12T18:34:45.815901768Z" level=info msg="TearDown network for sandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" successfully" Apr 12 18:34:45.826760 env[1336]: time="2024-04-12T18:34:45.826702592Z" level=info msg="RemovePodSandbox \"de3107d80102ead1fa9c184bff3e1e0ba9ac2ac5a2f19205f21f325410c7c406\" returns successfully" Apr 12 18:34:46.108174 kubelet[2459]: I0412 18:34:46.108136 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fbc56b784-2v7v4" podStartSLOduration=3.933168013 podCreationTimestamp="2024-04-12 18:34:40 +0000 UTC" firstStartedPulling="2024-04-12 18:34:42.427729631 +0000 UTC m=+57.744456790" lastFinishedPulling="2024-04-12 18:34:44.602640399 +0000 UTC m=+59.919367518" observedRunningTime="2024-04-12 18:34:45.098780854 +0000 UTC m=+60.415508013" watchObservedRunningTime="2024-04-12 18:34:46.108078741 +0000 UTC m=+61.424805900" Apr 12 18:34:46.108959 kubelet[2459]: I0412 18:34:46.108938 2459 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fbc56b784-98sct" podStartSLOduration=3.372053017 podCreationTimestamp="2024-04-12 18:34:40 +0000 UTC" firstStartedPulling="2024-04-12 18:34:42.434956143 +0000 UTC m=+57.751683302" lastFinishedPulling="2024-04-12 18:34:45.171798938 +0000 UTC m=+60.488526097" observedRunningTime="2024-04-12 18:34:46.108709183 +0000 UTC m=+61.425436342" watchObservedRunningTime="2024-04-12 18:34:46.108895812 +0000 UTC m=+61.425622931" Apr 12 18:34:46.132000 audit[4768]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:46.132000 audit[4768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe85d28e0 a2=0 a3=1 items=0 ppid=2590 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:46.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:46.138000 audit[4768]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:46.138000 audit[4768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe85d28e0 a2=0 a3=1 items=0 ppid=2590 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:46.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:46.152000 audit[4502]: AVC avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:34:46.152000 audit[4502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010f8e00 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:34:46.152000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:46.632000 audit[4621]: AVC avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:34:46.632000 audit[4621]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d15500 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:34:46.632000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:47.384649 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.UMyU1C.mount: Deactivated successfully. Apr 12 18:34:57.102000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.107837 kernel: kauditd_printk_skb: 122 callbacks suppressed Apr 12 18:34:57.107949 kernel: audit: type=1400 audit(1712946897.102:1407): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.102000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109d900 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.158508 kernel: audit: type=1300 audit(1712946897.102:1407): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109d900 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.102000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.182370 kernel: audit: type=1327 audit(1712946897.102:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.108000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.204953 kernel: audit: type=1400 audit(1712946897.108:1408): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.205180 kernel: audit: type=1300 audit(1712946897.108:1408): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109db00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.108000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109db00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.258800 kernel: audit: type=1327 audit(1712946897.108:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.108000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.280328 kernel: audit: type=1400 audit(1712946897.108:1409): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.280573 kernel: audit: type=1300 audit(1712946897.108:1409): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109db20 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.108000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400109db20 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.333751 kernel: audit: type=1327 audit(1712946897.108:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:57.333899 kernel: audit: type=1400 audit(1712946897.109:1410): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.109000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:57.109000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bd83c0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:34:57.109000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:09.303972 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.NMaBPn.mount: Deactivated successfully. Apr 12 18:35:11.797105 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.0jH2D5.mount: Deactivated successfully. Apr 12 18:35:11.850077 systemd[1]: run-containerd-runc-k8s.io-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9-runc.yTSlJ3.mount: Deactivated successfully. Apr 12 18:35:11.885000 audit[4889]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.892696 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:35:11.892819 kernel: audit: type=1325 audit(1712946911.885:1411): table=filter:126 family=2 entries=9 op=nft_register_rule pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.885000 audit[4889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffecbb5da0 a2=0 a3=1 items=0 ppid=2590 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.934978 kernel: audit: type=1300 audit(1712946911.885:1411): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffecbb5da0 a2=0 a3=1 items=0 ppid=2590 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:11.951196 kernel: audit: type=1327 audit(1712946911.885:1411): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:11.889000 audit[4889]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.969449 kernel: audit: type=1325 audit(1712946911.889:1412): table=nat:127 family=2 entries=27 op=nft_register_chain pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.889000 audit[4889]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffecbb5da0 a2=0 a3=1 items=0 ppid=2590 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.997159 kernel: audit: type=1300 audit(1712946911.889:1412): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffecbb5da0 a2=0 a3=1 items=0 ppid=2590 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:12.011344 kernel: audit: type=1327 audit(1712946911.889:1412): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:11.975000 audit[4892]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:12.026873 kernel: audit: type=1325 audit(1712946911.975:1413): table=filter:128 family=2 entries=8 op=nft_register_rule pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.975000 audit[4892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd0ef5fd0 a2=0 a3=1 items=0 ppid=2590 pid=4892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:12.055077 kernel: audit: type=1300 audit(1712946911.975:1413): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd0ef5fd0 a2=0 a3=1 items=0 ppid=2590 pid=4892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:12.069514 kernel: audit: type=1327 audit(1712946911.975:1413): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:12.069628 kernel: audit: type=1325 audit(1712946911.979:1414): table=nat:129 family=2 entries=34 op=nft_register_chain pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.979000 audit[4892]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_chain pid=4892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:35:11.979000 audit[4892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd0ef5fd0 a2=0 a3=1 items=0 ppid=2590 pid=4892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:11.979000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:35:17.386015 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.i6Asn3.mount: Deactivated successfully. Apr 12 18:35:23.153760 update_engine[1327]: I0412 18:35:23.153713 1327 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 18:35:23.153760 update_engine[1327]: I0412 18:35:23.153755 1327 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 18:35:23.154771 update_engine[1327]: I0412 18:35:23.154750 1327 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 18:35:23.155558 update_engine[1327]: I0412 18:35:23.155534 1327 omaha_request_params.cc:62] Current group set to lts Apr 12 18:35:23.155789 update_engine[1327]: I0412 18:35:23.155654 1327 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 18:35:23.155789 update_engine[1327]: I0412 18:35:23.155664 1327 update_attempter.cc:643] Scheduling an action processor start. Apr 12 18:35:23.155789 update_engine[1327]: I0412 18:35:23.155683 1327 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:35:23.155789 update_engine[1327]: I0412 18:35:23.155711 1327 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 18:35:23.157328 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:23.195238 update_engine[1327]: I0412 18:35:23.195190 1327 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:35:23.195238 update_engine[1327]: I0412 18:35:23.195225 1327 omaha_request_action.cc:271] Request: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: Apr 12 18:35:23.195238 update_engine[1327]: I0412 18:35:23.195231 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:23.196149 update_engine[1327]: I0412 18:35:23.196115 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:23.196778 update_engine[1327]: I0412 18:35:23.196753 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:23.582322 update_engine[1327]: E0412 18:35:23.582271 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:23.582490 update_engine[1327]: I0412 18:35:23.582417 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 18:35:34.123660 update_engine[1327]: I0412 18:35:34.123605 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:34.124017 update_engine[1327]: I0412 18:35:34.123805 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:34.124017 update_engine[1327]: I0412 18:35:34.124009 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:34.168088 update_engine[1327]: E0412 18:35:34.168045 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:34.168239 update_engine[1327]: I0412 18:35:34.168159 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 18:35:39.304432 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.EvW0EA.mount: Deactivated successfully. Apr 12 18:35:40.805000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.810699 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:35:40.810846 kernel: audit: type=1400 audit(1712946940.805:1415): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.805000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.855254 kernel: audit: type=1400 audit(1712946940.805:1416): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.855485 kernel: audit: type=1300 audit(1712946940.805:1416): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009aac7b0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.805000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4009aac7b0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.906879 kernel: audit: type=1327 audit(1712946940.805:1416): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.907013 kernel: audit: type=1300 audit(1712946940.805:1415): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400999f2c0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.805000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400999f2c0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.958013 kernel: audit: type=1327 audit(1712946940.805:1415): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.840000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.980303 kernel: audit: type=1400 audit(1712946940.840:1417): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.980429 kernel: audit: type=1300 audit(1712946940.840:1417): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400387c780 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.840000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400387c780 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.840000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:41.031444 kernel: audit: type=1327 audit(1712946940.840:1417): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.951000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:41.054853 kernel: audit: type=1400 audit(1712946940.951:1418): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.951000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4009aacb40 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.951000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.952000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.952000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400999f320 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:40.952000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:40.952000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400387d740 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:35:40.952000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:41.479321 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.AlsPvv.mount: Deactivated successfully. Apr 12 18:35:41.795234 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.puc1Y1.mount: Deactivated successfully. Apr 12 18:35:42.044000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:42.044000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40022ec9f0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:42.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:42.044000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:42.044000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40029e9620 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:42.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:42.472506 systemd[1]: run-containerd-runc-k8s.io-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9-runc.Z2DqmD.mount: Deactivated successfully. Apr 12 18:35:44.123859 update_engine[1327]: I0412 18:35:44.123816 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:44.124178 update_engine[1327]: I0412 18:35:44.124001 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:44.124210 update_engine[1327]: I0412 18:35:44.124187 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:44.502959 update_engine[1327]: E0412 18:35:44.502916 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:44.503110 update_engine[1327]: I0412 18:35:44.503051 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 18:35:46.153000 audit[4502]: AVC avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:35:46.159314 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:35:46.159435 kernel: audit: type=1400 audit(1712946946.153:1423): avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:35:46.153000 audit[4502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4a0c0 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:35:46.209993 kernel: audit: type=1300 audit(1712946946.153:1423): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4a0c0 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:35:46.210127 kernel: audit: type=1327 audit(1712946946.153:1423): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:46.153000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:46.633000 audit[4621]: AVC avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:35:46.633000 audit[4621]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003e5440 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:35:46.685198 kernel: audit: type=1400 audit(1712946946.633:1424): avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:35:46.685347 kernel: audit: type=1300 audit(1712946946.633:1424): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40003e5440 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:35:46.685382 kernel: audit: type=1327 audit(1712946946.633:1424): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:46.633000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:47.387259 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.YGe4US.mount: Deactivated successfully. Apr 12 18:35:55.126378 update_engine[1327]: I0412 18:35:55.126334 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:55.126746 update_engine[1327]: I0412 18:35:55.126529 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:55.126746 update_engine[1327]: I0412 18:35:55.126729 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:55.164004 update_engine[1327]: E0412 18:35:55.163969 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164074 1327 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164083 1327 omaha_request_action.cc:621] Omaha request response: Apr 12 18:35:55.164207 update_engine[1327]: E0412 18:35:55.164158 1327 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164171 1327 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164175 1327 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164176 1327 update_attempter.cc:306] Processing Done. Apr 12 18:35:55.164207 update_engine[1327]: E0412 18:35:55.164188 1327 update_attempter.cc:619] Update failed. Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164191 1327 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164194 1327 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 18:35:55.164207 update_engine[1327]: I0412 18:35:55.164197 1327 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164263 1327 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164281 1327 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164285 1327 omaha_request_action.cc:271] Request: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164289 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164426 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:55.164616 update_engine[1327]: I0412 18:35:55.164598 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:55.164849 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:55.183245 update_engine[1327]: E0412 18:35:55.183211 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183331 1327 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183338 1327 omaha_request_action.cc:621] Omaha request response: Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183343 1327 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183346 1327 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183349 1327 update_attempter.cc:306] Processing Done. Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183353 1327 update_attempter.cc:310] Error event sent. Apr 12 18:35:55.183384 update_engine[1327]: I0412 18:35:55.183362 1327 update_check_scheduler.cc:74] Next update check in 49m22s Apr 12 18:35:55.183731 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:57.102000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.102000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7ce0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.156539 kernel: audit: type=1400 audit(1712946957.102:1425): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.156692 kernel: audit: type=1300 audit(1712946957.102:1425): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7ce0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.102000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.181781 kernel: audit: type=1327 audit(1712946957.102:1425): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.107000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.204346 kernel: audit: type=1400 audit(1712946957.107:1426): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.204518 kernel: audit: type=1300 audit(1712946957.107:1426): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7d00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.107000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7d00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.256308 kernel: audit: type=1327 audit(1712946957.107:1426): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.108000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.277810 kernel: audit: type=1400 audit(1712946957.108:1427): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.277962 kernel: audit: type=1300 audit(1712946957.108:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7d60 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.108000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e7d60 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.330020 kernel: audit: type=1327 audit(1712946957.108:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:57.125000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.352929 kernel: audit: type=1400 audit(1712946957.125:1428): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:57.125000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400276e8c0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:35:57.125000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:09.301383 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.gJxmbT.mount: Deactivated successfully. Apr 12 18:36:11.792962 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.LIJnPS.mount: Deactivated successfully. Apr 12 18:36:12.786390 systemd[1]: run-containerd-runc-k8s.io-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9-runc.lfPLBb.mount: Deactivated successfully. Apr 12 18:36:17.381956 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.d6Buyc.mount: Deactivated successfully. Apr 12 18:36:39.303206 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.kdeiE9.mount: Deactivated successfully. Apr 12 18:36:40.807000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.812439 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:36:40.812575 kernel: audit: type=1400 audit(1712947000.807:1429): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.807000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.856688 kernel: audit: type=1400 audit(1712947000.807:1430): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.856837 kernel: audit: type=1300 audit(1712947000.807:1430): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4009364f30 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.807000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4009364f30 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.907278 kernel: audit: type=1327 audit(1712947000.807:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.907423 kernel: audit: type=1300 audit(1712947000.807:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400941d9e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.807000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400941d9e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.958668 kernel: audit: type=1327 audit(1712947000.807:1429): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.842000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.981592 kernel: audit: type=1400 audit(1712947000.842:1431): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.981758 kernel: audit: type=1300 audit(1712947000.842:1431): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40116ea560 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.842000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40116ea560 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.842000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:41.032821 kernel: audit: type=1327 audit(1712947000.842:1431): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:41.033311 kernel: audit: type=1400 audit(1712947000.953:1432): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.953000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.953000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40093650b0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.953000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.953000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=40116ea580 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:40.953000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:40.953000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400941dc80 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:36:40.953000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:41.478077 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.C8DbMa.mount: Deactivated successfully. Apr 12 18:36:42.045000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:42.045000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000802220 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:42.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:42.045000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:42.045000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000b19aa0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:42.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:42.472006 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.ixVU9b.mount: Deactivated successfully. Apr 12 18:36:46.161000 audit[4502]: AVC avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:36:46.167198 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:36:46.167354 kernel: audit: type=1400 audit(1712947006.161:1437): avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:36:46.161000 audit[4502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4b880 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:36:46.161000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:46.245325 kernel: audit: type=1300 audit(1712947006.161:1437): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000d4b880 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:36:46.245457 kernel: audit: type=1327 audit(1712947006.161:1437): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:46.637000 audit[4621]: AVC avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:36:46.637000 audit[4621]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d70000 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:36:46.687969 kernel: audit: type=1400 audit(1712947006.637:1438): avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:36:46.688126 kernel: audit: type=1300 audit(1712947006.637:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d70000 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:36:46.637000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:46.712804 kernel: audit: type=1327 audit(1712947006.637:1438): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:47.386008 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.OSCdSu.mount: Deactivated successfully. Apr 12 18:36:57.105000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.105000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ea3be0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.156950 kernel: audit: type=1400 audit(1712947017.105:1439): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.157095 kernel: audit: type=1300 audit(1712947017.105:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ea3be0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.105000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.181514 kernel: audit: type=1327 audit(1712947017.105:1439): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.203815 kernel: audit: type=1400 audit(1712947017.127:1440): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400095e4a0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.233212 kernel: audit: type=1300 audit(1712947017.127:1440): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400095e4a0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.257143 kernel: audit: type=1327 audit(1712947017.127:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.279168 kernel: audit: type=1400 audit(1712947017.127:1441): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.279344 kernel: audit: type=1300 audit(1712947017.127:1441): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ea3c00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ea3c00 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.332209 kernel: audit: type=1327 audit(1712947017.127:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.354073 kernel: audit: type=1400 audit(1712947017.127:1442): avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400095e640 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:36:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:09.313248 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.fiFIIL.mount: Deactivated successfully. Apr 12 18:37:11.790866 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.gxD1CJ.mount: Deactivated successfully. Apr 12 18:37:12.786404 systemd[1]: run-containerd-runc-k8s.io-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9-runc.ACBWW4.mount: Deactivated successfully. Apr 12 18:37:17.385305 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.12h8rh.mount: Deactivated successfully. Apr 12 18:37:17.448151 systemd[1]: Started sshd@7-10.200.20.27:22-10.200.12.6:49862.service. Apr 12 18:37:17.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.27:22-10.200.12.6:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:17.455145 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:37:17.455244 kernel: audit: type=1130 audit(1712947037.447:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.27:22-10.200.12.6:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:17.859000 audit[5387]: USER_ACCT pid=5387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.860259 sshd[5387]: Accepted publickey for core from 10.200.12.6 port 49862 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:17.862347 sshd[5387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:17.883543 kernel: audit: type=1101 audit(1712947037.859:1444): pid=5387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.883665 kernel: audit: type=1103 audit(1712947037.861:1445): pid=5387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.861000 audit[5387]: CRED_ACQ pid=5387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.910788 systemd-logind[1325]: New session 10 of user core. Apr 12 18:37:17.911531 systemd[1]: Started session-10.scope. Apr 12 18:37:17.919077 kernel: audit: type=1006 audit(1712947037.861:1446): pid=5387 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:37:17.861000 audit[5387]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccdbf770 a2=3 a3=1 items=0 ppid=1 pid=5387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:17.942625 kernel: audit: type=1300 audit(1712947037.861:1446): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccdbf770 a2=3 a3=1 items=0 ppid=1 pid=5387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:17.944481 kernel: audit: type=1327 audit(1712947037.861:1446): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:17.861000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:17.920000 audit[5387]: USER_START pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.975682 kernel: audit: type=1105 audit(1712947037.920:1447): pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.975814 kernel: audit: type=1103 audit(1712947037.922:1448): pid=5389 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:17.922000 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:18.413583 sshd[5387]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:18.414000 audit[5387]: USER_END pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:18.416959 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:37:18.417861 systemd[1]: sshd@7-10.200.20.27:22-10.200.12.6:49862.service: Deactivated successfully. Apr 12 18:37:18.415000 audit[5387]: CRED_DISP pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:18.461039 kernel: audit: type=1106 audit(1712947038.414:1449): pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:18.461174 kernel: audit: type=1104 audit(1712947038.415:1450): pid=5387 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:18.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.27:22-10.200.12.6:49862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:18.461344 systemd-logind[1325]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:37:18.462073 systemd-logind[1325]: Removed session 10. Apr 12 18:37:23.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.27:22-10.200.12.6:49868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:23.486285 systemd[1]: Started sshd@8-10.200.20.27:22-10.200.12.6:49868.service. Apr 12 18:37:23.491388 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:37:23.491464 kernel: audit: type=1130 audit(1712947043.486:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.27:22-10.200.12.6:49868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:23.916000 audit[5407]: USER_ACCT pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.917384 sshd[5407]: Accepted publickey for core from 10.200.12.6 port 49868 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:23.919284 sshd[5407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:23.918000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.964096 kernel: audit: type=1101 audit(1712947043.916:1453): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.964249 kernel: audit: type=1103 audit(1712947043.918:1454): pid=5407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.978939 kernel: audit: type=1006 audit(1712947043.918:1455): pid=5407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:37:23.918000 audit[5407]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd291b00 a2=3 a3=1 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:23.982164 systemd[1]: Started session-11.scope. Apr 12 18:37:23.983761 systemd-logind[1325]: New session 11 of user core. Apr 12 18:37:24.002538 kernel: audit: type=1300 audit(1712947043.918:1455): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd291b00 a2=3 a3=1 items=0 ppid=1 pid=5407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:23.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:24.010806 kernel: audit: type=1327 audit(1712947043.918:1455): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:24.010882 kernel: audit: type=1105 audit(1712947043.988:1456): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.988000 audit[5407]: USER_START pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:23.990000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.055680 kernel: audit: type=1103 audit(1712947043.990:1457): pid=5409 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.313558 sshd[5407]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:24.314000 audit[5407]: USER_END pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.316949 systemd-logind[1325]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:37:24.318250 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:37:24.319643 systemd-logind[1325]: Removed session 11. Apr 12 18:37:24.320371 systemd[1]: sshd@8-10.200.20.27:22-10.200.12.6:49868.service: Deactivated successfully. Apr 12 18:37:24.315000 audit[5407]: CRED_DISP pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.362100 kernel: audit: type=1106 audit(1712947044.314:1458): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.362244 kernel: audit: type=1104 audit(1712947044.315:1459): pid=5407 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:24.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.27:22-10.200.12.6:49868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:29.383236 systemd[1]: Started sshd@9-10.200.20.27:22-10.200.12.6:53180.service. Apr 12 18:37:29.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.27:22-10.200.12.6:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:29.390327 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:37:29.390458 kernel: audit: type=1130 audit(1712947049.383:1461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.27:22-10.200.12.6:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:29.785000 audit[5424]: USER_ACCT pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.788498 sshd[5424]: Accepted publickey for core from 10.200.12.6 port 53180 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:29.791839 sshd[5424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:29.791000 audit[5424]: CRED_ACQ pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.831337 kernel: audit: type=1101 audit(1712947049.785:1462): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.831471 kernel: audit: type=1103 audit(1712947049.791:1463): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.835291 systemd-logind[1325]: New session 12 of user core. Apr 12 18:37:29.835878 systemd[1]: Started session-12.scope. Apr 12 18:37:29.846046 kernel: audit: type=1006 audit(1712947049.791:1464): pid=5424 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:37:29.791000 audit[5424]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca544ae0 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.869483 kernel: audit: type=1300 audit(1712947049.791:1464): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca544ae0 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.791000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:29.877441 kernel: audit: type=1327 audit(1712947049.791:1464): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:29.877551 kernel: audit: type=1105 audit(1712947049.840:1465): pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.840000 audit[5424]: USER_START pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.842000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.924180 kernel: audit: type=1103 audit(1712947049.842:1466): pid=5426 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:30.169423 sshd[5424]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:30.170000 audit[5424]: USER_END pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:30.173195 systemd-logind[1325]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:37:30.174390 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:37:30.175546 systemd-logind[1325]: Removed session 12. Apr 12 18:37:30.176152 systemd[1]: sshd@9-10.200.20.27:22-10.200.12.6:53180.service: Deactivated successfully. Apr 12 18:37:30.170000 audit[5424]: CRED_DISP pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:30.218281 kernel: audit: type=1106 audit(1712947050.170:1467): pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:30.218434 kernel: audit: type=1104 audit(1712947050.170:1468): pid=5424 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:30.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.27:22-10.200.12.6:53180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:35.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.27:22-10.200.12.6:44198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:35.239603 systemd[1]: Started sshd@10-10.200.20.27:22-10.200.12.6:44198.service. Apr 12 18:37:35.244700 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:37:35.244799 kernel: audit: type=1130 audit(1712947055.239:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.27:22-10.200.12.6:44198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:35.644000 audit[5450]: USER_ACCT pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.645138 sshd[5450]: Accepted publickey for core from 10.200.12.6 port 44198 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:35.668331 kernel: audit: type=1101 audit(1712947055.644:1471): pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.669163 sshd[5450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:35.668000 audit[5450]: CRED_ACQ pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.706947 kernel: audit: type=1103 audit(1712947055.668:1472): pid=5450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.707074 kernel: audit: type=1006 audit(1712947055.668:1473): pid=5450 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:37:35.707094 kernel: audit: type=1300 audit(1712947055.668:1473): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8623130 a2=3 a3=1 items=0 ppid=1 pid=5450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:35.668000 audit[5450]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8623130 a2=3 a3=1 items=0 ppid=1 pid=5450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:35.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:35.739062 kernel: audit: type=1327 audit(1712947055.668:1473): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:35.742559 systemd[1]: Started session-13.scope. Apr 12 18:37:35.743012 systemd-logind[1325]: New session 13 of user core. Apr 12 18:37:35.747000 audit[5450]: USER_START pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.775320 kernel: audit: type=1105 audit(1712947055.747:1474): pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.775000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.797333 kernel: audit: type=1103 audit(1712947055.775:1475): pid=5452 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.073335 sshd[5450]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:36.074000 audit[5450]: USER_END pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.077079 systemd-logind[1325]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:37:36.078306 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:37:36.079406 systemd-logind[1325]: Removed session 13. Apr 12 18:37:36.080057 systemd[1]: sshd@10-10.200.20.27:22-10.200.12.6:44198.service: Deactivated successfully. Apr 12 18:37:36.075000 audit[5450]: CRED_DISP pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.121217 kernel: audit: type=1106 audit(1712947056.074:1476): pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.121401 kernel: audit: type=1104 audit(1712947056.075:1477): pid=5450 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.27:22-10.200.12.6:44198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:36.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.27:22-10.200.12.6:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:36.146786 systemd[1]: Started sshd@11-10.200.20.27:22-10.200.12.6:44204.service. Apr 12 18:37:36.576723 sshd[5468]: Accepted publickey for core from 10.200.12.6 port 44204 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:36.576000 audit[5468]: USER_ACCT pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.578037 sshd[5468]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:36.577000 audit[5468]: CRED_ACQ pid=5468 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.577000 audit[5468]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd6e4700 a2=3 a3=1 items=0 ppid=1 pid=5468 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:36.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:36.582735 systemd[1]: Started session-14.scope. Apr 12 18:37:36.583067 systemd-logind[1325]: New session 14 of user core. Apr 12 18:37:36.587000 audit[5468]: USER_START pid=5468 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:36.588000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:37.794400 sshd[5468]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:37.795000 audit[5468]: USER_END pid=5468 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:37.795000 audit[5468]: CRED_DISP pid=5468 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:37.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.27:22-10.200.12.6:44204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:37.797448 systemd[1]: sshd@11-10.200.20.27:22-10.200.12.6:44204.service: Deactivated successfully. Apr 12 18:37:37.798272 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:37:37.799769 systemd-logind[1325]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:37:37.801184 systemd-logind[1325]: Removed session 14. Apr 12 18:37:37.866678 systemd[1]: Started sshd@12-10.200.20.27:22-10.200.12.6:44208.service. Apr 12 18:37:37.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.27:22-10.200.12.6:44208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:38.269000 audit[5478]: USER_ACCT pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.270405 sshd[5478]: Accepted publickey for core from 10.200.12.6 port 44208 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:38.271000 audit[5478]: CRED_ACQ pid=5478 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.271000 audit[5478]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef2519f0 a2=3 a3=1 items=0 ppid=1 pid=5478 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:38.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:38.272058 sshd[5478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:38.276486 systemd-logind[1325]: New session 15 of user core. Apr 12 18:37:38.276939 systemd[1]: Started session-15.scope. Apr 12 18:37:38.280000 audit[5478]: USER_START pid=5478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.281000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.635479 sshd[5478]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:38.636000 audit[5478]: USER_END pid=5478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.637000 audit[5478]: CRED_DISP pid=5478 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:38.639231 systemd[1]: sshd@12-10.200.20.27:22-10.200.12.6:44208.service: Deactivated successfully. Apr 12 18:37:38.640037 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:37:38.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.27:22-10.200.12.6:44208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:38.640544 systemd-logind[1325]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:37:38.641233 systemd-logind[1325]: Removed session 15. Apr 12 18:37:39.316138 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.VmBAHO.mount: Deactivated successfully. Apr 12 18:37:40.807000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.813053 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:37:40.813192 kernel: audit: type=1400 audit(1712947060.807:1497): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.807000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015c4ff20 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.862548 kernel: audit: type=1300 audit(1712947060.807:1497): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015c4ff20 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.887083 kernel: audit: type=1327 audit(1712947060.807:1497): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.809000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.909124 kernel: audit: type=1400 audit(1712947060.809:1498): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.809000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015cbe630 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.937999 kernel: audit: type=1300 audit(1712947060.809:1498): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015cbe630 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.961742 kernel: audit: type=1327 audit(1712947060.809:1498): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.843000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.983422 kernel: audit: type=1400 audit(1712947060.843:1499): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.983565 kernel: audit: type=1300 audit(1712947060.843:1499): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015c978e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.843000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015c978e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.843000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:41.034766 kernel: audit: type=1327 audit(1712947060.843:1499): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:41.034917 kernel: audit: type=1400 audit(1712947060.955:1501): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.955000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.955000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4015d0c450 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.955000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.955000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4015c61c60 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:40.954000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:40.954000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4015cbe990 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:37:40.954000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:41.480033 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.jrB9Vg.mount: Deactivated successfully. Apr 12 18:37:42.046000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:42.046000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:42.046000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40020d50b0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:42.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:42.046000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013e6c20 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:42.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:43.712212 systemd[1]: Started sshd@13-10.200.20.27:22-10.200.12.6:44210.service. Apr 12 18:37:43.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.27:22-10.200.12.6:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:44.113000 audit[5575]: USER_ACCT pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.113786 sshd[5575]: Accepted publickey for core from 10.200.12.6 port 44210 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:44.114000 audit[5575]: CRED_ACQ pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.114000 audit[5575]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9a35a00 a2=3 a3=1 items=0 ppid=1 pid=5575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:44.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:44.115566 sshd[5575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:44.120158 systemd-logind[1325]: New session 16 of user core. Apr 12 18:37:44.120689 systemd[1]: Started session-16.scope. Apr 12 18:37:44.124000 audit[5575]: USER_START pid=5575 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.126000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.472270 sshd[5575]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:44.473000 audit[5575]: USER_END pid=5575 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.473000 audit[5575]: CRED_DISP pid=5575 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.475030 systemd[1]: sshd@13-10.200.20.27:22-10.200.12.6:44210.service: Deactivated successfully. Apr 12 18:37:44.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.27:22-10.200.12.6:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:44.475867 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:37:44.476525 systemd-logind[1325]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:37:44.477468 systemd-logind[1325]: Removed session 16. Apr 12 18:37:44.542445 systemd[1]: Started sshd@14-10.200.20.27:22-10.200.12.6:44214.service. Apr 12 18:37:44.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.27:22-10.200.12.6:44214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:44.946000 audit[5587]: USER_ACCT pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.946896 sshd[5587]: Accepted publickey for core from 10.200.12.6 port 44214 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:44.948000 audit[5587]: CRED_ACQ pid=5587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.948000 audit[5587]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfd47480 a2=3 a3=1 items=0 ppid=1 pid=5587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:44.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:44.948976 sshd[5587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:44.953843 systemd[1]: Started session-17.scope. Apr 12 18:37:44.954269 systemd-logind[1325]: New session 17 of user core. Apr 12 18:37:44.958000 audit[5587]: USER_START pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:44.959000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.390607 sshd[5587]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:45.391000 audit[5587]: USER_END pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.392000 audit[5587]: CRED_DISP pid=5587 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.394420 systemd-logind[1325]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:37:45.395781 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:37:45.396699 systemd[1]: sshd@14-10.200.20.27:22-10.200.12.6:44214.service: Deactivated successfully. Apr 12 18:37:45.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.27:22-10.200.12.6:44214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:45.397845 systemd-logind[1325]: Removed session 17. Apr 12 18:37:45.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.27:22-10.200.12.6:50138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:45.465199 systemd[1]: Started sshd@15-10.200.20.27:22-10.200.12.6:50138.service. Apr 12 18:37:45.870342 kernel: kauditd_printk_skb: 37 callbacks suppressed Apr 12 18:37:45.870475 kernel: audit: type=1101 audit(1712947065.864:1524): pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.864000 audit[5598]: USER_ACCT pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.867989 sshd[5598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:45.870847 sshd[5598]: Accepted publickey for core from 10.200.12.6 port 50138 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:45.866000 audit[5598]: CRED_ACQ pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.914092 kernel: audit: type=1103 audit(1712947065.866:1525): pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.928008 kernel: audit: type=1006 audit(1712947065.866:1526): pid=5598 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 18:37:45.866000 audit[5598]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6b835a0 a2=3 a3=1 items=0 ppid=1 pid=5598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:45.931902 systemd-logind[1325]: New session 18 of user core. Apr 12 18:37:45.932475 systemd[1]: Started session-18.scope. Apr 12 18:37:45.951800 kernel: audit: type=1300 audit(1712947065.866:1526): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6b835a0 a2=3 a3=1 items=0 ppid=1 pid=5598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:45.866000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:45.959814 kernel: audit: type=1327 audit(1712947065.866:1526): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:45.959937 kernel: audit: type=1105 audit(1712947065.951:1527): pid=5598 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.951000 audit[5598]: USER_START pid=5598 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:45.951000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.006150 kernel: audit: type=1103 audit(1712947065.951:1528): pid=5600 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.163000 audit[4502]: AVC avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:37:46.163000 audit[4502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bd01c0 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:37:46.220837 kernel: audit: type=1400 audit(1712947066.163:1529): avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:37:46.220976 kernel: audit: type=1300 audit(1712947066.163:1529): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000bd01c0 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:37:46.163000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:37:46.244410 kernel: audit: type=1327 audit(1712947066.163:1529): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:37:46.638000 audit[4621]: AVC avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:37:46.638000 audit[4621]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d70ea0 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:37:46.638000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:37:47.041000 audit[5617]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.041000 audit[5617]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc361a700 a2=0 a3=1 items=0 ppid=2590 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.042000 audit[5617]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.042000 audit[5617]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc361a700 a2=0 a3=1 items=0 ppid=2590 pid=5617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.057000 audit[5619]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=5619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.057000 audit[5619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffd1d00700 a2=0 a3=1 items=0 ppid=2590 pid=5619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.058000 audit[5619]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:47.058000 audit[5619]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd1d00700 a2=0 a3=1 items=0 ppid=2590 pid=5619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:47.131367 sshd[5598]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:47.131000 audit[5598]: USER_END pid=5598 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.132000 audit[5598]: CRED_DISP pid=5598 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.133529 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:37:47.134415 systemd[1]: sshd@15-10.200.20.27:22-10.200.12.6:50138.service: Deactivated successfully. Apr 12 18:37:47.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.27:22-10.200.12.6:50138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:47.135021 systemd-logind[1325]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:37:47.136014 systemd-logind[1325]: Removed session 18. Apr 12 18:37:47.202964 systemd[1]: Started sshd@16-10.200.20.27:22-10.200.12.6:50150.service. Apr 12 18:37:47.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.27:22-10.200.12.6:50150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:47.385016 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.FDxHzb.mount: Deactivated successfully. Apr 12 18:37:47.633000 audit[5622]: USER_ACCT pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.633832 sshd[5622]: Accepted publickey for core from 10.200.12.6 port 50150 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:47.634000 audit[5622]: CRED_ACQ pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.634000 audit[5622]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde9a9df0 a2=3 a3=1 items=0 ppid=1 pid=5622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.634000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:47.635453 sshd[5622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:47.639226 systemd-logind[1325]: New session 19 of user core. Apr 12 18:37:47.639714 systemd[1]: Started session-19.scope. Apr 12 18:37:47.644000 audit[5622]: USER_START pid=5622 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.645000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.231524 sshd[5622]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:48.232000 audit[5622]: USER_END pid=5622 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.232000 audit[5622]: CRED_DISP pid=5622 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.234959 systemd-logind[1325]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:37:48.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.27:22-10.200.12.6:50150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:48.235808 systemd[1]: sshd@16-10.200.20.27:22-10.200.12.6:50150.service: Deactivated successfully. Apr 12 18:37:48.236613 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:37:48.237731 systemd-logind[1325]: Removed session 19. Apr 12 18:37:48.300129 systemd[1]: Started sshd@17-10.200.20.27:22-10.200.12.6:50158.service. Apr 12 18:37:48.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.27:22-10.200.12.6:50158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:48.698000 audit[5652]: USER_ACCT pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.698798 sshd[5652]: Accepted publickey for core from 10.200.12.6 port 50158 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:48.699000 audit[5652]: CRED_ACQ pid=5652 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.699000 audit[5652]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8efaa20 a2=3 a3=1 items=0 ppid=1 pid=5652 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:48.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:48.700442 sshd[5652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:48.704812 systemd-logind[1325]: New session 20 of user core. Apr 12 18:37:48.705584 systemd[1]: Started session-20.scope. Apr 12 18:37:48.709000 audit[5652]: USER_START pid=5652 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.710000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:49.074333 sshd[5652]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:49.075000 audit[5652]: USER_END pid=5652 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:49.075000 audit[5652]: CRED_DISP pid=5652 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:49.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.27:22-10.200.12.6:50158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:49.077372 systemd[1]: sshd@17-10.200.20.27:22-10.200.12.6:50158.service: Deactivated successfully. Apr 12 18:37:49.078217 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:37:49.079070 systemd-logind[1325]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:37:49.079877 systemd-logind[1325]: Removed session 20. Apr 12 18:37:53.490000 audit[5664]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.497251 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 18:37:53.497365 kernel: audit: type=1325 audit(1712947073.490:1556): table=filter:134 family=2 entries=20 op=nft_register_rule pid=5664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.490000 audit[5664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe15e8760 a2=0 a3=1 items=0 ppid=2590 pid=5664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.538065 kernel: audit: type=1300 audit(1712947073.490:1556): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe15e8760 a2=0 a3=1 items=0 ppid=2590 pid=5664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:53.551316 kernel: audit: type=1327 audit(1712947073.490:1556): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:53.490000 audit[5664]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.566161 kernel: audit: type=1325 audit(1712947073.490:1557): table=nat:135 family=2 entries=106 op=nft_register_chain pid=5664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:37:53.490000 audit[5664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe15e8760 a2=0 a3=1 items=0 ppid=2590 pid=5664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.593379 kernel: audit: type=1300 audit(1712947073.490:1557): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe15e8760 a2=0 a3=1 items=0 ppid=2590 pid=5664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:53.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:53.607002 kernel: audit: type=1327 audit(1712947073.490:1557): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:37:54.142261 systemd[1]: Started sshd@18-10.200.20.27:22-10.200.12.6:50160.service. Apr 12 18:37:54.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.27:22-10.200.12.6:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:54.166320 kernel: audit: type=1130 audit(1712947074.141:1558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.27:22-10.200.12.6:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:54.538000 audit[5667]: USER_ACCT pid=5667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.539843 sshd[5667]: Accepted publickey for core from 10.200.12.6 port 50160 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:54.562000 audit[5667]: CRED_ACQ pid=5667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.564803 sshd[5667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:54.585945 kernel: audit: type=1101 audit(1712947074.538:1559): pid=5667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.586068 kernel: audit: type=1103 audit(1712947074.562:1560): pid=5667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.599827 kernel: audit: type=1006 audit(1712947074.563:1561): pid=5667 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:37:54.563000 audit[5667]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe10e4800 a2=3 a3=1 items=0 ppid=1 pid=5667 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:54.604543 systemd[1]: Started session-21.scope. Apr 12 18:37:54.605898 systemd-logind[1325]: New session 21 of user core. Apr 12 18:37:54.609000 audit[5667]: USER_START pid=5667 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.610000 audit[5669]: CRED_ACQ pid=5669 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.916288 sshd[5667]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:54.916000 audit[5667]: USER_END pid=5667 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.916000 audit[5667]: CRED_DISP pid=5667 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.919752 systemd-logind[1325]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:37:54.920982 systemd[1]: sshd@18-10.200.20.27:22-10.200.12.6:50160.service: Deactivated successfully. Apr 12 18:37:54.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.27:22-10.200.12.6:50160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:54.921747 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:37:54.922250 systemd-logind[1325]: Removed session 21. Apr 12 18:37:57.106000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:57.106000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d62480 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:57.106000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d624a0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:57.127000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d624c0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:57.127000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000ea3820 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:37:57.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:59.989559 systemd[1]: Started sshd@19-10.200.20.27:22-10.200.12.6:53738.service. Apr 12 18:37:59.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.27:22-10.200.12.6:53738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:59.995736 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:37:59.995843 kernel: audit: type=1130 audit(1712947079.988:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.27:22-10.200.12.6:53738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:00.418000 audit[5684]: USER_ACCT pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.420284 sshd[5684]: Accepted publickey for core from 10.200.12.6 port 53738 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:00.444388 kernel: audit: type=1101 audit(1712947080.418:1572): pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.442000 audit[5684]: CRED_ACQ pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.445030 sshd[5684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:00.481242 kernel: audit: type=1103 audit(1712947080.442:1573): pid=5684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.481384 kernel: audit: type=1006 audit(1712947080.443:1574): pid=5684 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:38:00.443000 audit[5684]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe33f9b60 a2=3 a3=1 items=0 ppid=1 pid=5684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:00.505395 kernel: audit: type=1300 audit(1712947080.443:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe33f9b60 a2=3 a3=1 items=0 ppid=1 pid=5684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:00.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:00.509219 systemd[1]: Started session-22.scope. Apr 12 18:38:00.515780 kernel: audit: type=1327 audit(1712947080.443:1574): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:00.515918 systemd-logind[1325]: New session 22 of user core. Apr 12 18:38:00.520000 audit[5684]: USER_START pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.521000 audit[5686]: CRED_ACQ pid=5686 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.568462 kernel: audit: type=1105 audit(1712947080.520:1575): pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.568679 kernel: audit: type=1103 audit(1712947080.521:1576): pid=5686 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.840064 sshd[5684]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:00.839000 audit[5684]: USER_END pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.842981 systemd-logind[1325]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:38:00.844173 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:38:00.845454 systemd-logind[1325]: Removed session 22. Apr 12 18:38:00.846053 systemd[1]: sshd@19-10.200.20.27:22-10.200.12.6:53738.service: Deactivated successfully. Apr 12 18:38:00.839000 audit[5684]: CRED_DISP pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.886603 kernel: audit: type=1106 audit(1712947080.839:1577): pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.886683 kernel: audit: type=1104 audit(1712947080.839:1578): pid=5684 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.27:22-10.200.12.6:53738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.27:22-10.200.12.6:54952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.908893 systemd[1]: Started sshd@20-10.200.20.27:22-10.200.12.6:54952.service. Apr 12 18:38:05.914657 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:05.914829 kernel: audit: type=1130 audit(1712947085.907:1580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.27:22-10.200.12.6:54952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:06.315000 audit[5698]: USER_ACCT pid=5698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.316708 sshd[5698]: Accepted publickey for core from 10.200.12.6 port 54952 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:06.318531 sshd[5698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:06.323493 systemd[1]: Started session-23.scope. Apr 12 18:38:06.325742 systemd-logind[1325]: New session 23 of user core. Apr 12 18:38:06.316000 audit[5698]: CRED_ACQ pid=5698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.362173 kernel: audit: type=1101 audit(1712947086.315:1581): pid=5698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.362282 kernel: audit: type=1103 audit(1712947086.316:1582): pid=5698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.376087 kernel: audit: type=1006 audit(1712947086.316:1583): pid=5698 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:38:06.376201 kernel: audit: type=1300 audit(1712947086.316:1583): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3de06c0 a2=3 a3=1 items=0 ppid=1 pid=5698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:06.316000 audit[5698]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3de06c0 a2=3 a3=1 items=0 ppid=1 pid=5698 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:06.316000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:06.407825 kernel: audit: type=1327 audit(1712947086.316:1583): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:06.407919 kernel: audit: type=1105 audit(1712947086.339:1584): pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.339000 audit[5698]: USER_START pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.341000 audit[5700]: CRED_ACQ pid=5700 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.453430 kernel: audit: type=1103 audit(1712947086.341:1585): pid=5700 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.699673 sshd[5698]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:06.699000 audit[5698]: USER_END pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.702953 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:38:06.703836 systemd[1]: sshd@20-10.200.20.27:22-10.200.12.6:54952.service: Deactivated successfully. Apr 12 18:38:06.747315 kernel: audit: type=1106 audit(1712947086.699:1586): pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.747440 kernel: audit: type=1104 audit(1712947086.700:1587): pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.700000 audit[5698]: CRED_DISP pid=5698 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.747711 systemd-logind[1325]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:38:06.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.27:22-10.200.12.6:54952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:06.749184 systemd-logind[1325]: Removed session 23. Apr 12 18:38:11.778387 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:11.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.27:22-10.200.12.6:54964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:11.773126 systemd[1]: Started sshd@21-10.200.20.27:22-10.200.12.6:54964.service. Apr 12 18:38:11.802324 kernel: audit: type=1130 audit(1712947091.771:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.27:22-10.200.12.6:54964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:11.820149 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.ZPG0R4.mount: Deactivated successfully. Apr 12 18:38:12.170000 audit[5738]: USER_ACCT pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.172923 sshd[5738]: Accepted publickey for core from 10.200.12.6 port 54964 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:12.177983 sshd[5738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:12.176000 audit[5738]: CRED_ACQ pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.216875 kernel: audit: type=1101 audit(1712947092.170:1590): pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.217007 kernel: audit: type=1103 audit(1712947092.176:1591): pid=5738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.231106 kernel: audit: type=1006 audit(1712947092.176:1592): pid=5738 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:38:12.176000 audit[5738]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e088b0 a2=3 a3=1 items=0 ppid=1 pid=5738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:12.235976 systemd-logind[1325]: New session 24 of user core. Apr 12 18:38:12.236708 systemd[1]: Started session-24.scope. Apr 12 18:38:12.256097 kernel: audit: type=1300 audit(1712947092.176:1592): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3e088b0 a2=3 a3=1 items=0 ppid=1 pid=5738 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:12.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:12.264311 kernel: audit: type=1327 audit(1712947092.176:1592): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:12.240000 audit[5738]: USER_START pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.289817 kernel: audit: type=1105 audit(1712947092.240:1593): pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.242000 audit[5778]: CRED_ACQ pid=5778 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.311119 kernel: audit: type=1103 audit(1712947092.242:1594): pid=5778 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.549548 sshd[5738]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:12.549000 audit[5738]: USER_END pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.553491 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:38:12.554245 systemd[1]: sshd@21-10.200.20.27:22-10.200.12.6:54964.service: Deactivated successfully. Apr 12 18:38:12.550000 audit[5738]: CRED_DISP pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.597346 kernel: audit: type=1106 audit(1712947092.549:1595): pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.597484 kernel: audit: type=1104 audit(1712947092.550:1596): pid=5738 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.597925 systemd-logind[1325]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:38:12.598995 systemd-logind[1325]: Removed session 24. Apr 12 18:38:12.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.27:22-10.200.12.6:54964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:12.812377 systemd[1]: run-containerd-runc-k8s.io-e08a42109cee13d47acb0e9bff9bae83a50b2eca32eed325f21a920fd67735e9-runc.g0EZHS.mount: Deactivated successfully. Apr 12 18:38:17.386848 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.pTtLef.mount: Deactivated successfully. Apr 12 18:38:17.619530 systemd[1]: Started sshd@22-10.200.20.27:22-10.200.12.6:33446.service. Apr 12 18:38:17.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.27:22-10.200.12.6:33446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:17.625383 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:17.625481 kernel: audit: type=1130 audit(1712947097.618:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.27:22-10.200.12.6:33446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:18.015000 audit[5807]: USER_ACCT pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.019538 sshd[5807]: Accepted publickey for core from 10.200.12.6 port 33446 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:18.023064 sshd[5807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:18.021000 audit[5807]: CRED_ACQ pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.043840 systemd[1]: Started session-25.scope. Apr 12 18:38:18.045176 systemd-logind[1325]: New session 25 of user core. Apr 12 18:38:18.063480 kernel: audit: type=1101 audit(1712947098.015:1599): pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.063609 kernel: audit: type=1103 audit(1712947098.021:1600): pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.079205 kernel: audit: type=1006 audit(1712947098.021:1601): pid=5807 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:38:18.079400 kernel: audit: type=1300 audit(1712947098.021:1601): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb013f80 a2=3 a3=1 items=0 ppid=1 pid=5807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:18.021000 audit[5807]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb013f80 a2=3 a3=1 items=0 ppid=1 pid=5807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:18.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:18.111822 kernel: audit: type=1327 audit(1712947098.021:1601): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:18.111949 kernel: audit: type=1105 audit(1712947098.049:1602): pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.049000 audit[5807]: USER_START pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.050000 audit[5809]: CRED_ACQ pid=5809 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.158094 kernel: audit: type=1103 audit(1712947098.050:1603): pid=5809 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.395135 sshd[5807]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:18.395000 audit[5807]: USER_END pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.398396 systemd-logind[1325]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:38:18.399721 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:38:18.401048 systemd-logind[1325]: Removed session 25. Apr 12 18:38:18.401850 systemd[1]: sshd@22-10.200.20.27:22-10.200.12.6:33446.service: Deactivated successfully. Apr 12 18:38:18.395000 audit[5807]: CRED_DISP pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.443451 kernel: audit: type=1106 audit(1712947098.395:1604): pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.443581 kernel: audit: type=1104 audit(1712947098.395:1605): pid=5807 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:18.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.27:22-10.200.12.6:33446 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:23.477073 systemd[1]: Started sshd@23-10.200.20.27:22-10.200.12.6:33458.service. Apr 12 18:38:23.503254 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:23.503427 kernel: audit: type=1130 audit(1712947103.475:1607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.27:22-10.200.12.6:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:23.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.27:22-10.200.12.6:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:23.879000 audit[5824]: USER_ACCT pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.881234 sshd[5824]: Accepted publickey for core from 10.200.12.6 port 33458 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:23.883415 sshd[5824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:23.881000 audit[5824]: CRED_ACQ pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.928021 kernel: audit: type=1101 audit(1712947103.879:1608): pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.928176 kernel: audit: type=1103 audit(1712947103.881:1609): pid=5824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.928211 kernel: audit: type=1006 audit(1712947103.881:1610): pid=5824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:38:23.881000 audit[5824]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc621a280 a2=3 a3=1 items=0 ppid=1 pid=5824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.963238 kernel: audit: type=1300 audit(1712947103.881:1610): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc621a280 a2=3 a3=1 items=0 ppid=1 pid=5824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.881000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:23.971646 kernel: audit: type=1327 audit(1712947103.881:1610): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:23.974809 systemd-logind[1325]: New session 26 of user core. Apr 12 18:38:23.975397 systemd[1]: Started session-26.scope. Apr 12 18:38:23.978000 audit[5824]: USER_START pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.980000 audit[5826]: CRED_ACQ pid=5826 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.026326 kernel: audit: type=1105 audit(1712947103.978:1611): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.026491 kernel: audit: type=1103 audit(1712947103.980:1612): pid=5826 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.299536 sshd[5824]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:24.299000 audit[5824]: USER_END pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.302986 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:38:24.303933 systemd[1]: sshd@23-10.200.20.27:22-10.200.12.6:33458.service: Deactivated successfully. Apr 12 18:38:24.300000 audit[5824]: CRED_DISP pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.327404 systemd-logind[1325]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:38:24.328338 systemd-logind[1325]: Removed session 26. Apr 12 18:38:24.347281 kernel: audit: type=1106 audit(1712947104.299:1613): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.347440 kernel: audit: type=1104 audit(1712947104.300:1614): pid=5824 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:24.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.27:22-10.200.12.6:33458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:29.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.27:22-10.200.12.6:50396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:29.368703 systemd[1]: Started sshd@24-10.200.20.27:22-10.200.12.6:50396.service. Apr 12 18:38:29.373705 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:29.373794 kernel: audit: type=1130 audit(1712947109.367:1616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.27:22-10.200.12.6:50396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:29.771000 audit[5840]: USER_ACCT pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.772842 sshd[5840]: Accepted publickey for core from 10.200.12.6 port 50396 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:29.797357 kernel: audit: type=1101 audit(1712947109.771:1617): pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.797478 kernel: audit: type=1103 audit(1712947109.795:1618): pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.795000 audit[5840]: CRED_ACQ pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.797890 sshd[5840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:29.834380 kernel: audit: type=1006 audit(1712947109.795:1619): pid=5840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:38:29.795000 audit[5840]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff041b910 a2=3 a3=1 items=0 ppid=1 pid=5840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:29.858752 kernel: audit: type=1300 audit(1712947109.795:1619): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff041b910 a2=3 a3=1 items=0 ppid=1 pid=5840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:29.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:29.866558 kernel: audit: type=1327 audit(1712947109.795:1619): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:29.869435 systemd-logind[1325]: New session 27 of user core. Apr 12 18:38:29.869929 systemd[1]: Started session-27.scope. Apr 12 18:38:29.873000 audit[5840]: USER_START pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.874000 audit[5842]: CRED_ACQ pid=5842 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.922070 kernel: audit: type=1105 audit(1712947109.873:1620): pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.922213 kernel: audit: type=1103 audit(1712947109.874:1621): pid=5842 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:30.173708 sshd[5840]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:30.173000 audit[5840]: USER_END pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:30.173000 audit[5840]: CRED_DISP pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:30.202261 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:38:30.203247 systemd[1]: sshd@24-10.200.20.27:22-10.200.12.6:50396.service: Deactivated successfully. Apr 12 18:38:30.222113 kernel: audit: type=1106 audit(1712947110.173:1622): pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:30.222253 kernel: audit: type=1104 audit(1712947110.173:1623): pid=5840 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:30.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.27:22-10.200.12.6:50396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:30.222909 systemd-logind[1325]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:38:30.223740 systemd-logind[1325]: Removed session 27. Apr 12 18:38:39.302586 systemd[1]: run-containerd-runc-k8s.io-df9e7fb7f7eea173364d869b0052312ad41e3aac8cbe1e7b8e8188d11dc097c3-runc.fSMoqS.mount: Deactivated successfully. Apr 12 18:38:40.809000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.815279 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:40.815383 kernel: audit: type=1400 audit(1712947120.809:1625): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.809000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.862481 kernel: audit: type=1400 audit(1712947120.809:1626): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.809000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4012b73d40 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.891652 kernel: audit: type=1300 audit(1712947120.809:1626): arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4012b73d40 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.917172 kernel: audit: type=1327 audit(1712947120.809:1626): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.809000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4008800690 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.946454 kernel: audit: type=1300 audit(1712947120.809:1625): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4008800690 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.969878 kernel: audit: type=1327 audit(1712947120.809:1625): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.844000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.993360 kernel: audit: type=1400 audit(1712947120.844:1627): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.993511 kernel: audit: type=1300 audit(1712947120.844:1627): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=401b0a52e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.844000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=401b0a52e0 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.844000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:41.045796 kernel: audit: type=1327 audit(1712947120.844:1627): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:41.045929 kernel: audit: type=1400 audit(1712947120.955:1628): avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.955000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.955000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4008800750 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.955000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.956000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.956000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4013e49760 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:40.956000 audit[2329]: AVC avc: denied { watch } for pid=2329 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:40.956000 audit[2329]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4008366120 a2=fc6 a3=0 items=0 ppid=2184 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c4,c318 key=(null) Apr 12 18:38:40.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:41.475709 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.DJ2nVg.mount: Deactivated successfully. Apr 12 18:38:42.047000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:42.047000 audit[2291]: AVC avc: denied { watch } for pid=2291 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:42.047000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40024864a0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:38:42.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:42.047000 audit[2291]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015a3dd0 a2=fc6 a3=0 items=0 ppid=2149 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:38:42.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:42.472267 systemd[1]: run-containerd-runc-k8s.io-764dbb3d63cf4d660566aeb90cd1da4f8d4df8ee94d559b078216e50819e740e-runc.CvutnW.mount: Deactivated successfully. Apr 12 18:38:44.931731 kubelet[2459]: W0412 18:38:44.931697 2459 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:38:45.091763 systemd[1]: cri-containerd-4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1.scope: Deactivated successfully. Apr 12 18:38:45.092138 systemd[1]: cri-containerd-4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1.scope: Consumed 4.659s CPU time. Apr 12 18:38:45.095000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:38:45.095000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:38:45.114127 kubelet[2459]: E0412 18:38:45.111497 2459 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.27:49900->10.200.20.40:2379: read: connection timed out" Apr 12 18:38:45.118523 systemd[1]: cri-containerd-acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3.scope: Deactivated successfully. Apr 12 18:38:45.118852 systemd[1]: cri-containerd-acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3.scope: Consumed 2.085s CPU time. Apr 12 18:38:45.121000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:38:45.121000 audit: BPF prog-id=104 op=UNLOAD Apr 12 18:38:45.125263 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1-rootfs.mount: Deactivated successfully. Apr 12 18:38:45.126757 env[1336]: time="2024-04-12T18:38:45.126623315Z" level=info msg="shim disconnected" id=4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1 Apr 12 18:38:45.127426 env[1336]: time="2024-04-12T18:38:45.127401259Z" level=warning msg="cleaning up after shim disconnected" id=4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1 namespace=k8s.io Apr 12 18:38:45.127561 env[1336]: time="2024-04-12T18:38:45.127545256Z" level=info msg="cleaning up dead shim" Apr 12 18:38:45.136231 env[1336]: time="2024-04-12T18:38:45.136185566Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5949 runtime=io.containerd.runc.v2\n" Apr 12 18:38:45.147113 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3-rootfs.mount: Deactivated successfully. Apr 12 18:38:45.149441 env[1336]: time="2024-04-12T18:38:45.149383345Z" level=info msg="shim disconnected" id=acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3 Apr 12 18:38:45.149441 env[1336]: time="2024-04-12T18:38:45.149438343Z" level=warning msg="cleaning up after shim disconnected" id=acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3 namespace=k8s.io Apr 12 18:38:45.149584 env[1336]: time="2024-04-12T18:38:45.149447943Z" level=info msg="cleaning up dead shim" Apr 12 18:38:45.157788 env[1336]: time="2024-04-12T18:38:45.157740619Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5975 runtime=io.containerd.runc.v2\n" Apr 12 18:38:45.588393 kubelet[2459]: I0412 18:38:45.588357 2459 scope.go:115] "RemoveContainer" containerID="acdb6b233bf0cff22c28fe22702a9fa1dcbe195cf26f746044cbbee3664e09d3" Apr 12 18:38:45.590986 env[1336]: time="2024-04-12T18:38:45.590948330Z" level=info msg="CreateContainer within sandbox \"40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:38:45.592109 kubelet[2459]: I0412 18:38:45.592076 2459 scope.go:115] "RemoveContainer" containerID="4f597e9372d22782def44a380d51ef7c6f32908e739f106422af3ded4d8f44e1" Apr 12 18:38:45.594608 env[1336]: time="2024-04-12T18:38:45.594562339Z" level=info msg="CreateContainer within sandbox \"7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:38:45.627054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1378866605.mount: Deactivated successfully. Apr 12 18:38:45.631355 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2341970102.mount: Deactivated successfully. Apr 12 18:38:45.653058 env[1336]: time="2024-04-12T18:38:45.652992983Z" level=info msg="CreateContainer within sandbox \"40a8a1428dcd4af15ed5b1ce9798112b530c6d88c988871437e430a003b2dd7b\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"f86398cbfb04ebdcba81a3fb47f2aa414ccf5495f75268a71da7e44f0044148a\"" Apr 12 18:38:45.653688 env[1336]: time="2024-04-12T18:38:45.653658890Z" level=info msg="StartContainer for \"f86398cbfb04ebdcba81a3fb47f2aa414ccf5495f75268a71da7e44f0044148a\"" Apr 12 18:38:45.659518 env[1336]: time="2024-04-12T18:38:45.659454055Z" level=info msg="CreateContainer within sandbox \"7918aa8e858f1538dd5910e4267fb382a2958a3bef51de87cd7b131c1043dd97\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"b2b04659efb52fd20aa3e4ef4a51413a4da25a098bcd9cafbc6da056341555df\"" Apr 12 18:38:45.660317 env[1336]: time="2024-04-12T18:38:45.660258759Z" level=info msg="StartContainer for \"b2b04659efb52fd20aa3e4ef4a51413a4da25a098bcd9cafbc6da056341555df\"" Apr 12 18:38:45.669380 systemd[1]: Started cri-containerd-f86398cbfb04ebdcba81a3fb47f2aa414ccf5495f75268a71da7e44f0044148a.scope. Apr 12 18:38:45.683178 systemd[1]: Started cri-containerd-b2b04659efb52fd20aa3e4ef4a51413a4da25a098bcd9cafbc6da056341555df.scope. Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.690000 audit: BPF prog-id=200 op=LOAD Apr 12 18:38:45.691000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.691000 audit[5998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2221 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363339386362666230346562646362613831613366623437663261 Apr 12 18:38:45.691000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.691000 audit[5998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2221 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363339386362666230346562646362613831613366623437663261 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.692000 audit: BPF prog-id=201 op=LOAD Apr 12 18:38:45.692000 audit[5998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2221 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363339386362666230346562646362613831613366623437663261 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.693000 audit: BPF prog-id=202 op=LOAD Apr 12 18:38:45.693000 audit[5998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2221 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363339386362666230346562646362613831613366623437663261 Apr 12 18:38:45.693000 audit: BPF prog-id=202 op=UNLOAD Apr 12 18:38:45.693000 audit: BPF prog-id=201 op=UNLOAD Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { perfmon } for pid=5998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit[5998]: AVC avc: denied { bpf } for pid=5998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.694000 audit: BPF prog-id=203 op=LOAD Apr 12 18:38:45.694000 audit[5998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2221 pid=5998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363339386362666230346562646362613831613366623437663261 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.703000 audit: BPF prog-id=204 op=LOAD Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2149 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623034363539656662353266643230616133653465663461353134 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2149 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623034363539656662353266643230616133653465663461353134 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit: BPF prog-id=205 op=LOAD Apr 12 18:38:45.704000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2149 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623034363539656662353266643230616133653465663461353134 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit: BPF prog-id=206 op=LOAD Apr 12 18:38:45.704000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2149 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623034363539656662353266643230616133653465663461353134 Apr 12 18:38:45.704000 audit: BPF prog-id=206 op=UNLOAD Apr 12 18:38:45.704000 audit: BPF prog-id=205 op=UNLOAD Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:45.704000 audit: BPF prog-id=207 op=LOAD Apr 12 18:38:45.704000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2149 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623034363539656662353266643230616133653465663461353134 Apr 12 18:38:45.730126 env[1336]: time="2024-04-12T18:38:45.730078098Z" level=info msg="StartContainer for \"f86398cbfb04ebdcba81a3fb47f2aa414ccf5495f75268a71da7e44f0044148a\" returns successfully" Apr 12 18:38:45.741568 env[1336]: time="2024-04-12T18:38:45.741518032Z" level=info msg="StartContainer for \"b2b04659efb52fd20aa3e4ef4a51413a4da25a098bcd9cafbc6da056341555df\" returns successfully" Apr 12 18:38:45.995611 systemd[1]: cri-containerd-fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0.scope: Deactivated successfully. Apr 12 18:38:45.995952 systemd[1]: cri-containerd-fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0.scope: Consumed 5.836s CPU time. Apr 12 18:38:46.002471 kernel: kauditd_printk_skb: 132 callbacks suppressed Apr 12 18:38:46.002642 kernel: audit: type=1334 audit(1712947125.995:1673): prog-id=121 op=UNLOAD Apr 12 18:38:45.995000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:38:46.009000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:38:46.019577 kernel: audit: type=1334 audit(1712947126.009:1674): prog-id=124 op=UNLOAD Apr 12 18:38:46.033762 env[1336]: time="2024-04-12T18:38:46.033699769Z" level=info msg="shim disconnected" id=fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0 Apr 12 18:38:46.033762 env[1336]: time="2024-04-12T18:38:46.033755328Z" level=warning msg="cleaning up after shim disconnected" id=fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0 namespace=k8s.io Apr 12 18:38:46.033762 env[1336]: time="2024-04-12T18:38:46.033766968Z" level=info msg="cleaning up dead shim" Apr 12 18:38:46.046442 env[1336]: time="2024-04-12T18:38:46.046398557Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6075 runtime=io.containerd.runc.v2\n" Apr 12 18:38:46.126655 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0-rootfs.mount: Deactivated successfully. Apr 12 18:38:46.166000 audit[4502]: AVC avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:38:46.166000 audit[4502]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f9120 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:38:46.238485 kernel: audit: type=1400 audit(1712947126.166:1675): avc: denied { watch } for pid=4502 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.708327582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c191 tclass=file permissive=0 Apr 12 18:38:46.238648 kernel: audit: type=1300 audit(1712947126.166:1675): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010f9120 a2=fc6 a3=0 items=0 ppid=4407 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c191 key=(null) Apr 12 18:38:46.166000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:46.273260 kernel: audit: type=1327 audit(1712947126.166:1675): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:46.595671 kubelet[2459]: I0412 18:38:46.595581 2459 scope.go:115] "RemoveContainer" containerID="fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0" Apr 12 18:38:46.598150 env[1336]: time="2024-04-12T18:38:46.598100115Z" level=info msg="CreateContainer within sandbox \"4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:38:46.639288 env[1336]: time="2024-04-12T18:38:46.639223058Z" level=info msg="CreateContainer within sandbox \"4cf27b3cfa45e38c1c6b8df4ee5631502c431322e30b0b82cfd4445c7ad1d7d2\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7\"" Apr 12 18:38:46.640880 env[1336]: time="2024-04-12T18:38:46.639967163Z" level=info msg="StartContainer for \"69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7\"" Apr 12 18:38:46.640000 audit[4621]: AVC avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:38:46.640000 audit[4621]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d713e0 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:38:46.708822 kernel: audit: type=1400 audit(1712947126.640:1676): avc: denied { watch } for pid=4621 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_41.1136841316/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c88,c959 tclass=file permissive=0 Apr 12 18:38:46.708967 kernel: audit: type=1300 audit(1712947126.640:1676): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d713e0 a2=fc6 a3=0 items=0 ppid=4424 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c959 key=(null) Apr 12 18:38:46.713119 systemd[1]: Started cri-containerd-69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7.scope. Apr 12 18:38:46.640000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:46.749252 kernel: audit: type=1327 audit(1712947126.640:1676): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.125341 kernel: audit: type=1400 audit(1712947127.085:1677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.125451 kernel: audit: type=1400 audit(1712947127.085:1678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.106000 audit: BPF prog-id=208 op=LOAD Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2642 pid=6097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:47.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633833353366323862366437356231626138356531353364353131 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2642 pid=6097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:47.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633833353366323862366437356231626138356531353364353131 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit: BPF prog-id=209 op=LOAD Apr 12 18:38:47.126000 audit[6097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2642 pid=6097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:47.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633833353366323862366437356231626138356531353364353131 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit: BPF prog-id=210 op=LOAD Apr 12 18:38:47.126000 audit[6097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2642 pid=6097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:47.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633833353366323862366437356231626138356531353364353131 Apr 12 18:38:47.126000 audit: BPF prog-id=210 op=UNLOAD Apr 12 18:38:47.126000 audit: BPF prog-id=209 op=UNLOAD Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { perfmon } for pid=6097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit[6097]: AVC avc: denied { bpf } for pid=6097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:47.126000 audit: BPF prog-id=211 op=LOAD Apr 12 18:38:47.126000 audit[6097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2642 pid=6097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:47.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639633833353366323862366437356231626138356531353364353131 Apr 12 18:38:47.186862 env[1336]: time="2024-04-12T18:38:47.186813921Z" level=info msg="StartContainer for \"69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7\" returns successfully" Apr 12 18:38:47.389242 systemd[1]: run-containerd-runc-k8s.io-c412201aab81098da8bed80822e0f9277751630b9a843f5aa03279a8d46648c2-runc.Czq6Ys.mount: Deactivated successfully. Apr 12 18:38:48.686000 audit[6032]: AVC avc: denied { watch } for pid=6032 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:48.686000 audit[6032]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e66000 a2=fc6 a3=0 items=0 ppid=2149 pid=6032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:38:48.686000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:48.687000 audit[6032]: AVC avc: denied { watch } for pid=6032 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:48.687000 audit[6032]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400069f3a0 a2=fc6 a3=0 items=0 ppid=2149 pid=6032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c742 key=(null) Apr 12 18:38:48.687000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:55.112003 kubelet[2459]: E0412 18:38:55.111957 2459 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:38:55.348363 kubelet[2459]: E0412 18:38:55.348237 2459 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.3-a-7076f33771.17c59c53dd61e3d5", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.3-a-7076f33771", UID:"19016fb7f3ef51ac3333389b6704fc3b", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Liveness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-7076f33771"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 38, 37, 294740437, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 38, 37, 294740437, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.27:49716->10.200.20.40:2379: read: connection timed out' (will not retry!) Apr 12 18:38:56.052157 kubelet[2459]: I0412 18:38:56.052109 2459 status_manager.go:809] "Failed to get status for pod" podUID=3c4216338621229228ecb0a07b12d357 pod="kube-system/kube-scheduler-ci-3510.3.3-a-7076f33771" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.27:49806->10.200.20.40:2379: read: connection timed out" Apr 12 18:38:59.319537 systemd[1]: cri-containerd-69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7.scope: Deactivated successfully. Apr 12 18:38:59.331352 kernel: kauditd_printk_skb: 61 callbacks suppressed Apr 12 18:38:59.331500 kernel: audit: type=1334 audit(1712947139.318:1697): prog-id=208 op=UNLOAD Apr 12 18:38:59.318000 audit: BPF prog-id=208 op=UNLOAD Apr 12 18:38:59.332000 audit: BPF prog-id=211 op=UNLOAD Apr 12 18:38:59.344339 kernel: audit: type=1334 audit(1712947139.332:1698): prog-id=211 op=UNLOAD Apr 12 18:38:59.354907 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7-rootfs.mount: Deactivated successfully. Apr 12 18:38:59.446781 env[1336]: time="2024-04-12T18:38:59.446729006Z" level=info msg="shim disconnected" id=69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7 Apr 12 18:38:59.447380 env[1336]: time="2024-04-12T18:38:59.447343353Z" level=warning msg="cleaning up after shim disconnected" id=69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7 namespace=k8s.io Apr 12 18:38:59.447380 env[1336]: time="2024-04-12T18:38:59.447375073Z" level=info msg="cleaning up dead shim" Apr 12 18:38:59.454754 env[1336]: time="2024-04-12T18:38:59.454698400Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6162 runtime=io.containerd.runc.v2\n" Apr 12 18:38:59.631172 kubelet[2459]: I0412 18:38:59.631080 2459 scope.go:115] "RemoveContainer" containerID="fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0" Apr 12 18:38:59.632479 kubelet[2459]: I0412 18:38:59.632457 2459 scope.go:115] "RemoveContainer" containerID="69c8353f28b6d75b1ba85e153d51197402d655e1aae2b6697eb27a749e5d82f7" Apr 12 18:38:59.632898 kubelet[2459]: E0412 18:38:59.632884 2459 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-786dc9d695-m4jwc_tigera-operator(10435cd0-bc98-4b49-8ce9-e6fc103240f2)\"" pod="tigera-operator/tigera-operator-786dc9d695-m4jwc" podUID=10435cd0-bc98-4b49-8ce9-e6fc103240f2 Apr 12 18:38:59.634319 env[1336]: time="2024-04-12T18:38:59.634262845Z" level=info msg="RemoveContainer for \"fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0\"" Apr 12 18:38:59.644364 env[1336]: time="2024-04-12T18:38:59.644316075Z" level=info msg="RemoveContainer for \"fb5c3032fba5c1d6583a1ab994eab9df55dc1e5646768f4382c282b5b212c7e0\" returns successfully" Apr 12 18:39:05.113527 kubelet[2459]: E0412 18:39:05.113486 2459 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.27:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-7076f33771?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:07.320321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.336408 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.352319 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.368599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.385868 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.401780 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.478870 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.487572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.487689 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.487793 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.487893 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.487996 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.488092 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.488199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.488311 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.488419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.488517 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.503792 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.504129 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.528552 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.528829 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.536992 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.545377 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.545632 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.562151 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.562386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.579250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.579536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.596312 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.596554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.613521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.613815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.630577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.630880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.656880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.657173 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.657276 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.673947 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.674194 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.690298 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.690553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.706013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.706268 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.722334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.722574 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.737946 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.738164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.753768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.754057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.769646 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.769884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.786074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.786380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.801904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.802163 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.817637 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.817887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.833325 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.833596 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.856932 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.857176 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.857287 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.872696 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.873021 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.888573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.888837 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.904437 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.904712 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.912339 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.927850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.928072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.943604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.982389 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.982675 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.982836 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.982940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.983040 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.983143 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.998785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:07.999059 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.014287 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.030154 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.030278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.030413 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.045703 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.045938 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.063029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.063277 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.080769 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.102125 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.102243 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.102375 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.114155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.162085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.222455 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.222643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.222748 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.222866 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.222970 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223166 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223270 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223539 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223879 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.223988 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.234752 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.235007 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.251318 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.273141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.273270 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.273392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.283275 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.283572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.299034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.329427 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.329645 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.329758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.329884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.340562 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.340816 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.356850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.390808 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.390942 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.391040 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.391134 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.400672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.400964 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.416806 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.417092 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.432942 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.490409 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.490645 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523213 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523670 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523773 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523879 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.523978 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.524072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.524172 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.524272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.539474 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.539767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.555768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.556019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.571710 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.571966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.588339 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.604944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.605218 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.605343 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.620852 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.628983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.629237 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.646733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.650158 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.655897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.663890 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.680952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.681263 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.698692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.710145 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.710408 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.737034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.753877 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.753994 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.754087 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.778100 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.778382 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.778496 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.781833 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.798073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.798437 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.816488 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.816789 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.833765 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.834049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.850944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.851178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.866944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.867185 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.882975 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.883248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.899254 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.899554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.915641 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.915900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.932378 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.932661 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.948600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.948859 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.965109 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.965370 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.989733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.990008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.990123 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.998161 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.015006 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.015323 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.037324 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.037600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.048781 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.049024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.066184 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.066424 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.083461 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.083772 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.106319 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.106625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.118302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.118553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.135503 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.135787 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.144438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.160899 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.178052 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.178158 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.178257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.186927 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.203981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.204232 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.246728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264156 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264368 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264472 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.264580 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.271917 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.300258 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.300494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.300619 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.314422 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.314669 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.332154 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.332434 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.353821 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.354063 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.367439 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.367705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.385164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.403349 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.403655 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.403774 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.420461 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.420755 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.438930 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.439198 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.456609 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.456862 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.474434 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.474677 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.501257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.501539 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.501634 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.510541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.528334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.528599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.545226 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.545491 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.562849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.563113 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.585317 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.585557 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.597189 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.597471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.615239 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.615542 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.632713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.633018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.650952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:09.651281 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#152 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001