Apr 12 18:27:54.018460 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:27:54.018479 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:27:54.018487 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Apr 12 18:27:54.018494 kernel: printk: bootconsole [pl11] enabled Apr 12 18:27:54.018499 kernel: efi: EFI v2.70 by EDK II Apr 12 18:27:54.018505 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Apr 12 18:27:54.018511 kernel: random: crng init done Apr 12 18:27:54.018516 kernel: ACPI: Early table checksum verification disabled Apr 12 18:27:54.018522 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Apr 12 18:27:54.018527 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.018533 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.018539 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Apr 12 18:27:54.018545 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.018550 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.018557 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.023594 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.023619 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.023630 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.023636 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Apr 12 18:27:54.023642 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:27:54.023648 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Apr 12 18:27:54.023654 kernel: NUMA: Failed to initialise from firmware Apr 12 18:27:54.023660 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:27:54.023666 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Apr 12 18:27:54.023672 kernel: Zone ranges: Apr 12 18:27:54.023677 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Apr 12 18:27:54.023683 kernel: DMA32 empty Apr 12 18:27:54.023690 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:27:54.023696 kernel: Movable zone start for each node Apr 12 18:27:54.023702 kernel: Early memory node ranges Apr 12 18:27:54.023707 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Apr 12 18:27:54.023713 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Apr 12 18:27:54.023719 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Apr 12 18:27:54.023724 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Apr 12 18:27:54.023730 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Apr 12 18:27:54.023736 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Apr 12 18:27:54.023742 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Apr 12 18:27:54.023747 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Apr 12 18:27:54.023753 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:27:54.023761 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:27:54.023769 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Apr 12 18:27:54.023775 kernel: psci: probing for conduit method from ACPI. Apr 12 18:27:54.023782 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:27:54.023788 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:27:54.023795 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 18:27:54.023801 kernel: psci: SMC Calling Convention v1.4 Apr 12 18:27:54.023807 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Apr 12 18:27:54.023813 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Apr 12 18:27:54.023819 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:27:54.023825 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:27:54.023832 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:27:54.023838 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:27:54.023844 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:27:54.023850 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:27:54.023856 kernel: CPU features: detected: Spectre-BHB Apr 12 18:27:54.023862 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:27:54.023870 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:27:54.023876 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:27:54.023882 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Apr 12 18:27:54.023888 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Apr 12 18:27:54.023894 kernel: Policy zone: Normal Apr 12 18:27:54.023901 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:27:54.023908 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:27:54.023914 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:27:54.023920 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:27:54.023926 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:27:54.023934 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Apr 12 18:27:54.023941 kernel: Memory: 3990264K/4194160K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 203896K reserved, 0K cma-reserved) Apr 12 18:27:54.023947 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:27:54.023953 kernel: trace event string verifier disabled Apr 12 18:27:54.023959 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:27:54.023966 kernel: rcu: RCU event tracing is enabled. Apr 12 18:27:54.023973 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:27:54.023979 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:27:54.023985 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:27:54.023991 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:27:54.024012 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:27:54.024020 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:27:54.024026 kernel: GICv3: 960 SPIs implemented Apr 12 18:27:54.024032 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:27:54.024038 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:27:54.024044 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:27:54.024050 kernel: GICv3: 16 PPIs implemented Apr 12 18:27:54.024056 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Apr 12 18:27:54.024062 kernel: ITS: No ITS available, not enabling LPIs Apr 12 18:27:54.024068 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:27:54.024074 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:27:54.024081 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:27:54.024087 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:27:54.024095 kernel: Console: colour dummy device 80x25 Apr 12 18:27:54.024102 kernel: printk: console [tty1] enabled Apr 12 18:27:54.024109 kernel: ACPI: Core revision 20210730 Apr 12 18:27:54.024115 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:27:54.024122 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:27:54.024128 kernel: LSM: Security Framework initializing Apr 12 18:27:54.024134 kernel: SELinux: Initializing. Apr 12 18:27:54.024140 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:27:54.024147 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:27:54.024154 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Apr 12 18:27:54.024161 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Apr 12 18:27:54.024167 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:27:54.024173 kernel: Remapping and enabling EFI services. Apr 12 18:27:54.024179 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:27:54.024186 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:27:54.024192 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Apr 12 18:27:54.024198 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:27:54.024205 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:27:54.024218 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:27:54.024224 kernel: SMP: Total of 2 processors activated. Apr 12 18:27:54.024230 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:27:54.024237 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Apr 12 18:27:54.024243 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:27:54.024250 kernel: CPU features: detected: CRC32 instructions Apr 12 18:27:54.024256 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:27:54.024262 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:27:54.024269 kernel: CPU features: detected: Privileged Access Never Apr 12 18:27:54.024277 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:27:54.024283 kernel: alternatives: patching kernel code Apr 12 18:27:54.024294 kernel: devtmpfs: initialized Apr 12 18:27:54.024302 kernel: KASLR enabled Apr 12 18:27:54.024309 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:27:54.024316 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:27:54.024322 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:27:54.024329 kernel: SMBIOS 3.1.0 present. Apr 12 18:27:54.024336 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Apr 12 18:27:54.024343 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:27:54.024351 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:27:54.024358 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:27:54.024365 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:27:54.024371 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:27:54.024378 kernel: audit: type=2000 audit(0.090:1): state=initialized audit_enabled=0 res=1 Apr 12 18:27:54.024385 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:27:54.024391 kernel: cpuidle: using governor menu Apr 12 18:27:54.024399 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:27:54.024406 kernel: ASID allocator initialised with 32768 entries Apr 12 18:27:54.024412 kernel: ACPI: bus type PCI registered Apr 12 18:27:54.024419 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:27:54.024425 kernel: Serial: AMBA PL011 UART driver Apr 12 18:27:54.024432 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:27:54.024439 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:27:54.024445 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:27:54.024452 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:27:54.024460 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:27:54.024467 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:27:54.024473 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:27:54.024480 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:27:54.024487 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:27:54.024494 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:27:54.024501 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:27:54.024507 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:27:54.024514 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:27:54.024522 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:27:54.024528 kernel: ACPI: Interpreter enabled Apr 12 18:27:54.024535 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:27:54.024541 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:27:54.024548 kernel: printk: console [ttyAMA0] enabled Apr 12 18:27:54.024555 kernel: printk: bootconsole [pl11] disabled Apr 12 18:27:54.024598 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Apr 12 18:27:54.024607 kernel: iommu: Default domain type: Translated Apr 12 18:27:54.024613 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:27:54.024622 kernel: vgaarb: loaded Apr 12 18:27:54.024628 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:27:54.024635 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:27:54.024642 kernel: PTP clock support registered Apr 12 18:27:54.024648 kernel: Registered efivars operations Apr 12 18:27:54.024655 kernel: No ACPI PMU IRQ for CPU0 Apr 12 18:27:54.024661 kernel: No ACPI PMU IRQ for CPU1 Apr 12 18:27:54.024668 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:27:54.024675 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:27:54.024683 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:27:54.024689 kernel: pnp: PnP ACPI init Apr 12 18:27:54.024696 kernel: pnp: PnP ACPI: found 0 devices Apr 12 18:27:54.024702 kernel: NET: Registered PF_INET protocol family Apr 12 18:27:54.024710 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:27:54.024716 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:27:54.024723 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:27:54.024730 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:27:54.024736 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:27:54.024745 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:27:54.024752 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:27:54.024758 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:27:54.024765 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:27:54.024771 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:27:54.024778 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Apr 12 18:27:54.024785 kernel: kvm [1]: HYP mode not available Apr 12 18:27:54.024792 kernel: Initialise system trusted keyrings Apr 12 18:27:54.024798 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:27:54.024806 kernel: Key type asymmetric registered Apr 12 18:27:54.024813 kernel: Asymmetric key parser 'x509' registered Apr 12 18:27:54.024819 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:27:54.024826 kernel: io scheduler mq-deadline registered Apr 12 18:27:54.024833 kernel: io scheduler kyber registered Apr 12 18:27:54.024839 kernel: io scheduler bfq registered Apr 12 18:27:54.024846 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:27:54.024852 kernel: thunder_xcv, ver 1.0 Apr 12 18:27:54.024859 kernel: thunder_bgx, ver 1.0 Apr 12 18:27:54.024867 kernel: nicpf, ver 1.0 Apr 12 18:27:54.024873 kernel: nicvf, ver 1.0 Apr 12 18:27:54.025016 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:27:54.025077 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:27:53 UTC (1712946473) Apr 12 18:27:54.025086 kernel: efifb: probing for efifb Apr 12 18:27:54.025092 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Apr 12 18:27:54.025099 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Apr 12 18:27:54.025106 kernel: efifb: scrolling: redraw Apr 12 18:27:54.025115 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 18:27:54.025122 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:27:54.025129 kernel: fb0: EFI VGA frame buffer device Apr 12 18:27:54.025135 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Apr 12 18:27:54.025142 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:27:54.025149 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:27:54.025156 kernel: Segment Routing with IPv6 Apr 12 18:27:54.025162 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:27:54.025169 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:27:54.025177 kernel: Key type dns_resolver registered Apr 12 18:27:54.025184 kernel: registered taskstats version 1 Apr 12 18:27:54.025191 kernel: Loading compiled-in X.509 certificates Apr 12 18:27:54.025198 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:27:54.025204 kernel: Key type .fscrypt registered Apr 12 18:27:54.025211 kernel: Key type fscrypt-provisioning registered Apr 12 18:27:54.025217 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:27:54.025224 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:27:54.025231 kernel: ima: No architecture policies found Apr 12 18:27:54.025238 kernel: Freeing unused kernel memory: 36352K Apr 12 18:27:54.025245 kernel: Run /init as init process Apr 12 18:27:54.025252 kernel: with arguments: Apr 12 18:27:54.025258 kernel: /init Apr 12 18:27:54.025264 kernel: with environment: Apr 12 18:27:54.025271 kernel: HOME=/ Apr 12 18:27:54.025278 kernel: TERM=linux Apr 12 18:27:54.025284 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:27:54.025293 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:27:54.025304 systemd[1]: Detected virtualization microsoft. Apr 12 18:27:54.025311 systemd[1]: Detected architecture arm64. Apr 12 18:27:54.025318 systemd[1]: Running in initrd. Apr 12 18:27:54.025325 systemd[1]: No hostname configured, using default hostname. Apr 12 18:27:54.025332 systemd[1]: Hostname set to . Apr 12 18:27:54.025339 systemd[1]: Initializing machine ID from random generator. Apr 12 18:27:54.025346 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:27:54.025355 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:27:54.025362 systemd[1]: Reached target cryptsetup.target. Apr 12 18:27:54.025369 systemd[1]: Reached target paths.target. Apr 12 18:27:54.025376 systemd[1]: Reached target slices.target. Apr 12 18:27:54.025383 systemd[1]: Reached target swap.target. Apr 12 18:27:54.025390 systemd[1]: Reached target timers.target. Apr 12 18:27:54.025397 systemd[1]: Listening on iscsid.socket. Apr 12 18:27:54.025404 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:27:54.025413 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:27:54.025420 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:27:54.025427 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:27:54.025434 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:27:54.025442 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:27:54.025449 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:27:54.025456 systemd[1]: Reached target sockets.target. Apr 12 18:27:54.025463 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:27:54.025470 systemd[1]: Finished network-cleanup.service. Apr 12 18:27:54.025479 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:27:54.025486 systemd[1]: Starting systemd-journald.service... Apr 12 18:27:54.025493 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:27:54.025500 systemd[1]: Starting systemd-resolved.service... Apr 12 18:27:54.025507 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:27:54.025519 systemd-journald[236]: Journal started Apr 12 18:27:54.025561 systemd-journald[236]: Runtime Journal (/run/log/journal/03d7aa849f6e4d83bc495923bde4f05d) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:27:54.006057 systemd-modules-load[237]: Inserted module 'overlay' Apr 12 18:27:54.055033 systemd[1]: Started systemd-journald.service. Apr 12 18:27:54.055093 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:27:54.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.062701 systemd-modules-load[237]: Inserted module 'br_netfilter' Apr 12 18:27:54.095581 kernel: Bridge firewalling registered Apr 12 18:27:54.095604 kernel: audit: type=1130 audit(1712946474.058:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.095615 kernel: SCSI subsystem initialized Apr 12 18:27:54.077603 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:27:54.121643 kernel: audit: type=1130 audit(1712946474.100:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.091120 systemd-resolved[238]: Positive Trust Anchors: Apr 12 18:27:54.163759 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:27:54.163783 kernel: audit: type=1130 audit(1712946474.138:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.163794 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:27:54.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.091128 systemd-resolved[238]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:27:54.216656 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:27:54.216679 kernel: audit: type=1130 audit(1712946474.170:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.216689 kernel: audit: type=1130 audit(1712946474.198:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.091159 systemd-resolved[238]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:27:54.100104 systemd-resolved[238]: Defaulting to hostname 'linux'. Apr 12 18:27:54.101177 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:27:54.138707 systemd[1]: Started systemd-resolved.service. Apr 12 18:27:54.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.171008 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:27:54.303033 kernel: audit: type=1130 audit(1712946474.277:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.198604 systemd[1]: Reached target nss-lookup.target. Apr 12 18:27:54.215658 systemd-modules-load[237]: Inserted module 'dm_multipath' Apr 12 18:27:54.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.222093 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:27:54.337707 kernel: audit: type=1130 audit(1712946474.312:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.256832 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:27:54.268860 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:27:54.298839 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:27:54.336461 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:27:54.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.351372 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:27:54.383835 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:27:54.388761 kernel: audit: type=1130 audit(1712946474.359:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.393315 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:27:54.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.419456 dracut-cmdline[258]: dracut-dracut-053 Apr 12 18:27:54.423442 kernel: audit: type=1130 audit(1712946474.397:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.423938 dracut-cmdline[258]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:27:54.510589 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:27:54.526590 kernel: iscsi: registered transport (tcp) Apr 12 18:27:54.546772 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:27:54.546794 kernel: QLogic iSCSI HBA Driver Apr 12 18:27:54.577053 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:27:54.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:54.582215 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:27:54.634582 kernel: raid6: neonx8 gen() 13814 MB/s Apr 12 18:27:54.654575 kernel: raid6: neonx8 xor() 10837 MB/s Apr 12 18:27:54.674572 kernel: raid6: neonx4 gen() 13552 MB/s Apr 12 18:27:54.695577 kernel: raid6: neonx4 xor() 11307 MB/s Apr 12 18:27:54.715572 kernel: raid6: neonx2 gen() 12965 MB/s Apr 12 18:27:54.735572 kernel: raid6: neonx2 xor() 10441 MB/s Apr 12 18:27:54.756574 kernel: raid6: neonx1 gen() 10500 MB/s Apr 12 18:27:54.776572 kernel: raid6: neonx1 xor() 8772 MB/s Apr 12 18:27:54.796577 kernel: raid6: int64x8 gen() 6275 MB/s Apr 12 18:27:54.817578 kernel: raid6: int64x8 xor() 3543 MB/s Apr 12 18:27:54.837572 kernel: raid6: int64x4 gen() 7207 MB/s Apr 12 18:27:54.857572 kernel: raid6: int64x4 xor() 3854 MB/s Apr 12 18:27:54.878573 kernel: raid6: int64x2 gen() 6155 MB/s Apr 12 18:27:54.898572 kernel: raid6: int64x2 xor() 3320 MB/s Apr 12 18:27:54.918572 kernel: raid6: int64x1 gen() 5046 MB/s Apr 12 18:27:54.943507 kernel: raid6: int64x1 xor() 2646 MB/s Apr 12 18:27:54.943518 kernel: raid6: using algorithm neonx8 gen() 13814 MB/s Apr 12 18:27:54.943526 kernel: raid6: .... xor() 10837 MB/s, rmw enabled Apr 12 18:27:54.947884 kernel: raid6: using neon recovery algorithm Apr 12 18:27:54.968936 kernel: xor: measuring software checksum speed Apr 12 18:27:54.968950 kernel: 8regs : 17297 MB/sec Apr 12 18:27:54.972897 kernel: 32regs : 20755 MB/sec Apr 12 18:27:54.976854 kernel: arm64_neon : 27854 MB/sec Apr 12 18:27:54.976863 kernel: xor: using function: arm64_neon (27854 MB/sec) Apr 12 18:27:55.037581 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:27:55.047246 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:27:55.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:55.054000 audit: BPF prog-id=7 op=LOAD Apr 12 18:27:55.054000 audit: BPF prog-id=8 op=LOAD Apr 12 18:27:55.056037 systemd[1]: Starting systemd-udevd.service... Apr 12 18:27:55.073905 systemd-udevd[435]: Using default interface naming scheme 'v252'. Apr 12 18:27:55.080932 systemd[1]: Started systemd-udevd.service. Apr 12 18:27:55.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:55.090887 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:27:55.106112 dracut-pre-trigger[456]: rd.md=0: removing MD RAID activation Apr 12 18:27:55.136738 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:27:55.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:55.142054 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:27:55.181270 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:27:55.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:55.237591 kernel: hv_vmbus: Vmbus version:5.3 Apr 12 18:27:55.244663 kernel: hv_vmbus: registering driver hyperv_keyboard Apr 12 18:27:55.261585 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Apr 12 18:27:55.273602 kernel: hv_vmbus: registering driver hid_hyperv Apr 12 18:27:55.273654 kernel: hv_vmbus: registering driver hv_netvsc Apr 12 18:27:55.273664 kernel: hv_vmbus: registering driver hv_storvsc Apr 12 18:27:55.284596 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Apr 12 18:27:55.296044 kernel: scsi host0: storvsc_host_t Apr 12 18:27:55.296241 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Apr 12 18:27:55.296319 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Apr 12 18:27:55.305414 kernel: scsi host1: storvsc_host_t Apr 12 18:27:55.305492 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Apr 12 18:27:55.332963 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Apr 12 18:27:55.333194 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:27:55.340112 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Apr 12 18:27:55.340301 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Apr 12 18:27:55.344474 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 18:27:55.348431 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 18:27:55.355190 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Apr 12 18:27:55.355379 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Apr 12 18:27:55.365013 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:27:55.365072 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 18:27:55.387592 kernel: hv_netvsc 000d3a06-0630-000d-3a06-0630000d3a06 eth0: VF slot 1 added Apr 12 18:27:55.404077 kernel: hv_vmbus: registering driver hv_pci Apr 12 18:27:55.404127 kernel: hv_pci d35d062a-b2ec-4eca-842e-7ced7b49f9e4: PCI VMBus probing: Using version 0x10004 Apr 12 18:27:55.421255 kernel: hv_pci d35d062a-b2ec-4eca-842e-7ced7b49f9e4: PCI host bridge to bus b2ec:00 Apr 12 18:27:55.421430 kernel: pci_bus b2ec:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Apr 12 18:27:55.421528 kernel: pci_bus b2ec:00: No busn resource found for root bus, will use [bus 00-ff] Apr 12 18:27:55.433991 kernel: pci b2ec:00:02.0: [15b3:1018] type 00 class 0x020000 Apr 12 18:27:55.447337 kernel: pci b2ec:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:27:55.468013 kernel: pci b2ec:00:02.0: enabling Extended Tags Apr 12 18:27:55.485615 kernel: pci b2ec:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at b2ec:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Apr 12 18:27:55.497085 kernel: pci_bus b2ec:00: busn_res: [bus 00-ff] end is updated to 00 Apr 12 18:27:55.497219 kernel: pci b2ec:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:27:55.538588 kernel: mlx5_core b2ec:00:02.0: firmware version: 16.30.1284 Apr 12 18:27:55.698584 kernel: mlx5_core b2ec:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Apr 12 18:27:55.756707 kernel: hv_netvsc 000d3a06-0630-000d-3a06-0630000d3a06 eth0: VF registering: eth1 Apr 12 18:27:55.756905 kernel: mlx5_core b2ec:00:02.0 eth1: joined to eth0 Apr 12 18:27:55.768587 kernel: mlx5_core b2ec:00:02.0 enP45804s1: renamed from eth1 Apr 12 18:27:55.907964 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:27:55.941602 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (496) Apr 12 18:27:55.955322 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:27:56.196376 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:27:56.203534 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:27:56.215039 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:27:56.221226 systemd[1]: Starting disk-uuid.service... Apr 12 18:27:56.249596 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:27:56.258591 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:27:57.264589 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:27:57.265779 disk-uuid[563]: The operation has completed successfully. Apr 12 18:27:57.331656 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:27:57.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.331750 systemd[1]: Finished disk-uuid.service. Apr 12 18:27:57.336834 systemd[1]: Starting verity-setup.service... Apr 12 18:27:57.383630 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:27:57.580066 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:27:57.586071 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:27:57.595070 systemd[1]: Finished verity-setup.service. Apr 12 18:27:57.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.652587 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:27:57.653136 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:27:57.657108 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:27:57.657961 systemd[1]: Starting ignition-setup.service... Apr 12 18:27:57.664469 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:27:57.701576 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:27:57.701634 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:27:57.706259 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:27:57.750339 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:27:57.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.758000 audit: BPF prog-id=9 op=LOAD Apr 12 18:27:57.759599 systemd[1]: Starting systemd-networkd.service... Apr 12 18:27:57.782292 systemd-networkd[804]: lo: Link UP Apr 12 18:27:57.782304 systemd-networkd[804]: lo: Gained carrier Apr 12 18:27:57.783065 systemd-networkd[804]: Enumeration completed Apr 12 18:27:57.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.785671 systemd[1]: Started systemd-networkd.service. Apr 12 18:27:57.786069 systemd-networkd[804]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:27:57.793954 systemd[1]: Reached target network.target. Apr 12 18:27:57.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.802575 systemd[1]: Starting iscsiuio.service... Apr 12 18:27:57.818595 systemd[1]: Started iscsiuio.service. Apr 12 18:27:57.834658 iscsid[813]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:27:57.834658 iscsid[813]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:27:57.834658 iscsid[813]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:27:57.834658 iscsid[813]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:27:57.834658 iscsid[813]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:27:57.834658 iscsid[813]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:27:57.834658 iscsid[813]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:27:57.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.823248 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:27:57.826354 systemd[1]: Starting iscsid.service... Apr 12 18:27:57.837837 systemd[1]: Started iscsid.service. Apr 12 18:27:57.866274 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:27:57.896936 systemd[1]: Finished ignition-setup.service. Apr 12 18:27:57.902666 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:27:57.913846 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:27:57.924700 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:27:57.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:27:57.933557 systemd[1]: Reached target remote-fs.target. Apr 12 18:27:57.942031 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:27:57.956522 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:27:57.969079 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:27:58.011586 kernel: mlx5_core b2ec:00:02.0 enP45804s1: Link up Apr 12 18:27:58.058356 kernel: hv_netvsc 000d3a06-0630-000d-3a06-0630000d3a06 eth0: Data path switched to VF: enP45804s1 Apr 12 18:27:58.058518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:27:58.058978 systemd-networkd[804]: enP45804s1: Link UP Apr 12 18:27:58.059174 systemd-networkd[804]: eth0: Link UP Apr 12 18:27:58.059494 systemd-networkd[804]: eth0: Gained carrier Apr 12 18:27:58.073090 systemd-networkd[804]: enP45804s1: Gained carrier Apr 12 18:27:58.083649 systemd-networkd[804]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:27:59.777833 systemd-networkd[804]: eth0: Gained IPv6LL Apr 12 18:28:01.060484 ignition[824]: Ignition 2.14.0 Apr 12 18:28:01.063591 ignition[824]: Stage: fetch-offline Apr 12 18:28:01.063694 ignition[824]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:01.063720 ignition[824]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:01.223254 ignition[824]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:01.223426 ignition[824]: parsed url from cmdline: "" Apr 12 18:28:01.223430 ignition[824]: no config URL provided Apr 12 18:28:01.223435 ignition[824]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:28:01.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.236610 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:28:01.276150 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:28:01.276176 kernel: audit: type=1130 audit(1712946481.244:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.223444 ignition[824]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:28:01.255122 systemd[1]: Starting ignition-fetch.service... Apr 12 18:28:01.223449 ignition[824]: failed to fetch config: resource requires networking Apr 12 18:28:01.223889 ignition[824]: Ignition finished successfully Apr 12 18:28:01.262979 ignition[834]: Ignition 2.14.0 Apr 12 18:28:01.262985 ignition[834]: Stage: fetch Apr 12 18:28:01.263104 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:01.263129 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:01.267611 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:01.267839 ignition[834]: parsed url from cmdline: "" Apr 12 18:28:01.267846 ignition[834]: no config URL provided Apr 12 18:28:01.267854 ignition[834]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:28:01.267864 ignition[834]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:28:01.267911 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Apr 12 18:28:01.296743 ignition[834]: GET result: OK Apr 12 18:28:01.352082 unknown[834]: fetched base config from "system" Apr 12 18:28:01.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.296828 ignition[834]: config has been read from IMDS userdata Apr 12 18:28:01.388887 kernel: audit: type=1130 audit(1712946481.359:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.352092 unknown[834]: fetched base config from "system" Apr 12 18:28:01.296888 ignition[834]: parsing config with SHA512: 9e828de1ec3f700f74e772d6c34593f83fa1dba86b4fa936bffd17f26d6c413ea51300c6ef4480510032520698e895a4a095f016e834aafa6f7a4586f338aada Apr 12 18:28:01.352098 unknown[834]: fetched user config from "azure" Apr 12 18:28:01.352766 ignition[834]: fetch: fetch complete Apr 12 18:28:01.354180 systemd[1]: Finished ignition-fetch.service. Apr 12 18:28:01.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.352772 ignition[834]: fetch: fetch passed Apr 12 18:28:01.427032 kernel: audit: type=1130 audit(1712946481.407:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.380202 systemd[1]: Starting ignition-kargs.service... Apr 12 18:28:01.352821 ignition[834]: Ignition finished successfully Apr 12 18:28:01.403948 systemd[1]: Finished ignition-kargs.service. Apr 12 18:28:01.391880 ignition[840]: Ignition 2.14.0 Apr 12 18:28:01.391887 ignition[840]: Stage: kargs Apr 12 18:28:01.392005 ignition[840]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:01.442150 systemd[1]: Starting ignition-disks.service... Apr 12 18:28:01.392027 ignition[840]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:01.395053 ignition[840]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:01.399341 ignition[840]: kargs: kargs passed Apr 12 18:28:01.468628 systemd[1]: Finished ignition-disks.service. Apr 12 18:28:01.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.399421 ignition[840]: Ignition finished successfully Apr 12 18:28:01.505019 kernel: audit: type=1130 audit(1712946481.475:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.476356 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:28:01.457176 ignition[846]: Ignition 2.14.0 Apr 12 18:28:01.501264 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:28:01.457183 ignition[846]: Stage: disks Apr 12 18:28:01.509332 systemd[1]: Reached target local-fs.target. Apr 12 18:28:01.457308 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:01.517689 systemd[1]: Reached target sysinit.target. Apr 12 18:28:01.457333 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:01.524541 systemd[1]: Reached target basic.target. Apr 12 18:28:01.460432 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:01.535809 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:28:01.463012 ignition[846]: disks: disks passed Apr 12 18:28:01.463100 ignition[846]: Ignition finished successfully Apr 12 18:28:01.627886 systemd-fsck[854]: ROOT: clean, 612/7326000 files, 481074/7359488 blocks Apr 12 18:28:01.640106 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:28:01.666527 kernel: audit: type=1130 audit(1712946481.644:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:01.663380 systemd[1]: Mounting sysroot.mount... Apr 12 18:28:01.685430 systemd[1]: Mounted sysroot.mount. Apr 12 18:28:01.692460 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:28:01.689360 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:28:01.732643 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:28:01.737656 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 18:28:01.744871 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:28:01.744908 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:28:01.751434 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:28:01.839443 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:28:01.844579 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:28:01.874212 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) Apr 12 18:28:01.874275 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:28:01.874286 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:28:01.885416 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:28:01.885522 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:28:01.894591 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:28:01.910386 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:28:01.952324 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:28:01.964756 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:28:02.593136 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:28:02.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:02.616534 systemd[1]: Starting ignition-mount.service... Apr 12 18:28:02.627454 kernel: audit: type=1130 audit(1712946482.597:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:02.625145 systemd[1]: Starting sysroot-boot.service... Apr 12 18:28:02.631693 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:28:02.631814 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:28:02.662356 systemd[1]: Finished sysroot-boot.service. Apr 12 18:28:02.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:02.687588 kernel: audit: type=1130 audit(1712946482.666:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:02.773313 ignition[934]: INFO : Ignition 2.14.0 Apr 12 18:28:02.777624 ignition[934]: INFO : Stage: mount Apr 12 18:28:02.782901 ignition[934]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:02.782901 ignition[934]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:02.804637 ignition[934]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:02.816288 ignition[934]: INFO : mount: mount passed Apr 12 18:28:02.816288 ignition[934]: INFO : Ignition finished successfully Apr 12 18:28:02.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:02.812242 systemd[1]: Finished ignition-mount.service. Apr 12 18:28:02.845659 kernel: audit: type=1130 audit(1712946482.816:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:03.442508 coreos-metadata[864]: Apr 12 18:28:03.442 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:28:03.451059 coreos-metadata[864]: Apr 12 18:28:03.450 INFO Fetch successful Apr 12 18:28:03.484844 coreos-metadata[864]: Apr 12 18:28:03.484 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:28:03.498741 coreos-metadata[864]: Apr 12 18:28:03.498 INFO Fetch successful Apr 12 18:28:03.526870 coreos-metadata[864]: Apr 12 18:28:03.526 INFO wrote hostname ci-3510.3.3-a-2842bd657c to /sysroot/etc/hostname Apr 12 18:28:03.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:03.535705 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 18:28:03.566088 kernel: audit: type=1130 audit(1712946483.540:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:03.546613 systemd[1]: Starting ignition-files.service... Apr 12 18:28:03.565077 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:28:03.594623 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) Apr 12 18:28:03.594666 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:28:03.594682 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:28:03.599282 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:28:03.609021 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:28:03.622635 ignition[962]: INFO : Ignition 2.14.0 Apr 12 18:28:03.622635 ignition[962]: INFO : Stage: files Apr 12 18:28:03.631504 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:03.631504 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:03.631504 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:03.656660 ignition[962]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:28:03.656660 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:28:03.656660 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:28:03.714508 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:28:03.721751 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:28:03.738122 unknown[962]: wrote ssh authorized keys file for user: core Apr 12 18:28:03.743378 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:28:03.743378 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:28:03.743378 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:28:04.285678 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:28:04.447279 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:28:04.463139 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:28:04.463139 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:28:04.463139 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:28:04.760216 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:28:04.975844 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:28:04.975844 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:28:04.975844 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:28:05.333726 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:28:05.596129 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:28:05.613289 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:28:05.613289 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:28:05.613289 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:28:06.028034 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:28:06.345361 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Apr 12 18:28:06.359526 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:28:06.359526 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:28:06.359526 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:28:06.400885 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:28:06.693772 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 18:28:06.693772 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:28:06.693772 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:28:06.693772 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:28:06.745778 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:28:07.352595 ignition[962]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:28:07.368978 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:28:07.603140 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (967) Apr 12 18:28:07.603167 kernel: audit: type=1130 audit(1712946487.462:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.603178 kernel: audit: type=1130 audit(1712946487.540:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.603187 kernel: audit: type=1131 audit(1712946487.566:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem704584999" Apr 12 18:28:07.603287 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem704584999": device or resource busy Apr 12 18:28:07.603287 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem704584999", trying btrfs: device or resource busy Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem704584999" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem704584999" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem704584999" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem704584999" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem524577441" Apr 12 18:28:07.603287 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem524577441": device or resource busy Apr 12 18:28:07.603287 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem524577441", trying btrfs: device or resource busy Apr 12 18:28:07.603287 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem524577441" Apr 12 18:28:07.428644 systemd[1]: mnt-oem704584999.mount: Deactivated successfully. Apr 12 18:28:07.758115 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem524577441" Apr 12 18:28:07.758115 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem524577441" Apr 12 18:28:07.758115 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem524577441" Apr 12 18:28:07.758115 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(17): [started] processing unit "waagent.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(17): [finished] processing unit "waagent.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(18): [started] processing unit "nvidia.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(18): [finished] processing unit "nvidia.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:28:07.758115 ignition[962]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:28:08.012928 kernel: audit: type=1130 audit(1712946487.791:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.012959 kernel: audit: type=1130 audit(1712946487.893:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.012969 kernel: audit: type=1131 audit(1712946487.916:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.449053 systemd[1]: Finished ignition-files.service. Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(20): [started] setting preset to enabled for "waagent.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(20): [finished] setting preset to enabled for "waagent.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(21): [started] setting preset to enabled for "nvidia.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(21): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(23): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:28:08.018107 ignition[962]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:28:08.018107 ignition[962]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:28:08.018107 ignition[962]: INFO : files: files passed Apr 12 18:28:08.018107 ignition[962]: INFO : Ignition finished successfully Apr 12 18:28:08.208177 kernel: audit: type=1130 audit(1712946488.022:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.208210 kernel: audit: type=1131 audit(1712946488.119:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.208288 initrd-setup-root-after-ignition[987]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:28:07.489409 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:28:07.503531 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:28:07.512849 systemd[1]: Starting ignition-quench.service... Apr 12 18:28:07.527446 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:28:07.527575 systemd[1]: Finished ignition-quench.service. Apr 12 18:28:07.778863 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:28:08.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.819435 systemd[1]: Reached target ignition-complete.target. Apr 12 18:28:07.836254 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:28:08.308786 kernel: audit: type=1131 audit(1712946488.274:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.879525 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:28:08.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.879725 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:28:07.917489 systemd[1]: Reached target initrd-fs.target. Apr 12 18:28:07.928952 systemd[1]: Reached target initrd.target. Apr 12 18:28:08.357015 kernel: audit: type=1131 audit(1712946488.312:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.959325 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:28:08.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:07.969946 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:28:08.017845 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:28:08.052757 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:28:08.392580 iscsid[813]: iscsid shutting down. Apr 12 18:28:08.397023 ignition[1000]: INFO : Ignition 2.14.0 Apr 12 18:28:08.397023 ignition[1000]: INFO : Stage: umount Apr 12 18:28:08.397023 ignition[1000]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:28:08.397023 ignition[1000]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:28:08.397023 ignition[1000]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:28:08.397023 ignition[1000]: INFO : umount: umount passed Apr 12 18:28:08.397023 ignition[1000]: INFO : Ignition finished successfully Apr 12 18:28:08.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.073865 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:28:08.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.084755 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:28:08.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.096490 systemd[1]: Stopped target timers.target. Apr 12 18:28:08.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.107571 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:28:08.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.107654 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:28:08.144046 systemd[1]: Stopped target initrd.target. Apr 12 18:28:08.155639 systemd[1]: Stopped target basic.target. Apr 12 18:28:08.166890 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:28:08.180733 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:28:08.194388 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:28:08.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.203125 systemd[1]: Stopped target remote-fs.target. Apr 12 18:28:08.212294 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:28:08.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.225115 systemd[1]: Stopped target sysinit.target. Apr 12 18:28:08.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.234336 systemd[1]: Stopped target local-fs.target. Apr 12 18:28:08.248404 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:28:08.257114 systemd[1]: Stopped target swap.target. Apr 12 18:28:08.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.266257 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:28:08.266323 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:28:08.296339 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:28:08.304790 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:28:08.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.304850 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:28:08.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.335894 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:28:08.647000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:28:08.335955 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:28:08.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.345042 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:28:08.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.345089 systemd[1]: Stopped ignition-files.service. Apr 12 18:28:08.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.353403 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 18:28:08.353450 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 18:28:08.368396 systemd[1]: Stopping ignition-mount.service... Apr 12 18:28:08.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.378950 systemd[1]: Stopping iscsid.service... Apr 12 18:28:08.400838 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:28:08.407447 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:28:08.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.407536 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:28:08.755641 kernel: hv_netvsc 000d3a06-0630-000d-3a06-0630000d3a06 eth0: Data path switched from VF: enP45804s1 Apr 12 18:28:08.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.415998 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:28:08.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.416059 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:28:08.423469 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:28:08.423611 systemd[1]: Stopped iscsid.service. Apr 12 18:28:08.445118 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:28:08.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.445233 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:28:08.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.456112 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:28:08.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.456215 systemd[1]: Stopped ignition-mount.service. Apr 12 18:28:08.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.465628 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:28:08.465691 systemd[1]: Stopped ignition-disks.service. Apr 12 18:28:08.474269 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:28:08.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:08.474314 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:28:08.482012 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:28:08.482056 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:28:08.491447 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:28:08.491505 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:28:08.499465 systemd[1]: Stopped target paths.target. Apr 12 18:28:08.508624 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:28:08.889763 systemd-journald[236]: Received SIGTERM from PID 1 (n/a). Apr 12 18:28:08.512980 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:28:08.521085 systemd[1]: Stopped target slices.target. Apr 12 18:28:08.525209 systemd[1]: Stopped target sockets.target. Apr 12 18:28:08.532971 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:28:08.533021 systemd[1]: Closed iscsid.socket. Apr 12 18:28:08.540920 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:28:08.541001 systemd[1]: Stopped ignition-setup.service. Apr 12 18:28:08.549893 systemd[1]: Stopping iscsiuio.service... Apr 12 18:28:08.559050 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:28:08.559525 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:28:08.559645 systemd[1]: Stopped iscsiuio.service. Apr 12 18:28:08.566305 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:28:08.566393 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:28:08.574533 systemd[1]: Stopped target network.target. Apr 12 18:28:08.582257 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:28:08.582300 systemd[1]: Closed iscsiuio.socket. Apr 12 18:28:08.589457 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:28:08.589507 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:28:08.598203 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:28:08.605461 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:28:08.617943 systemd-networkd[804]: eth0: DHCPv6 lease lost Apr 12 18:28:08.889000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:28:08.619422 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:28:08.619517 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:28:08.629098 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:28:08.629196 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:28:08.638618 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:28:08.638656 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:28:08.648937 systemd[1]: Stopping network-cleanup.service... Apr 12 18:28:08.659016 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:28:08.659083 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:28:08.664020 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:28:08.664085 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:28:08.678800 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:28:08.678864 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:28:08.684190 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:28:08.693182 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:28:08.698947 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:28:08.699123 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:28:08.708667 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:28:08.708713 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:28:08.717188 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:28:08.717229 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:28:08.725200 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:28:08.725259 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:28:08.733435 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:28:08.733484 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:28:08.751488 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:28:08.751543 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:28:08.764931 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:28:08.779308 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:28:08.779387 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:28:08.792171 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:28:08.792230 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:28:08.796753 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:28:08.796800 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:28:08.806506 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:28:08.807115 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:28:08.807200 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:28:08.824647 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:28:08.824767 systemd[1]: Stopped network-cleanup.service. Apr 12 18:28:08.832899 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:28:08.843113 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:28:08.860312 systemd[1]: Switching root. Apr 12 18:28:08.891382 systemd-journald[236]: Journal stopped Apr 12 18:28:23.289759 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:28:23.289789 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:28:23.289836 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:28:23.289861 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:28:23.289870 kernel: SELinux: policy capability open_perms=1 Apr 12 18:28:23.289878 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:28:23.289887 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:28:23.289896 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:28:23.289997 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:28:23.290008 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:28:23.290019 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:28:23.290030 systemd[1]: Successfully loaded SELinux policy in 303.456ms. Apr 12 18:28:23.290040 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.094ms. Apr 12 18:28:23.290051 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:28:23.290063 systemd[1]: Detected virtualization microsoft. Apr 12 18:28:23.290073 systemd[1]: Detected architecture arm64. Apr 12 18:28:23.290082 systemd[1]: Detected first boot. Apr 12 18:28:23.290091 systemd[1]: Hostname set to . Apr 12 18:28:23.290100 systemd[1]: Initializing machine ID from random generator. Apr 12 18:28:23.290109 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:28:23.290118 kernel: kauditd_printk_skb: 41 callbacks suppressed Apr 12 18:28:23.290128 kernel: audit: type=1400 audit(1712946494.112:89): avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:28:23.290139 kernel: audit: type=1300 audit(1712946494.112:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=400002226c a1=4000028300 a2=4000026700 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:23.290149 kernel: audit: type=1327 audit(1712946494.112:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:28:23.290158 kernel: audit: type=1400 audit(1712946494.126:90): avc: denied { associate } for pid=1033 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:28:23.290168 kernel: audit: type=1300 audit(1712946494.126:90): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022349 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:23.290176 kernel: audit: type=1307 audit(1712946494.126:90): cwd="/" Apr 12 18:28:23.290186 kernel: audit: type=1302 audit(1712946494.126:90): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:23.290196 kernel: audit: type=1302 audit(1712946494.126:90): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:23.290206 kernel: audit: type=1327 audit(1712946494.126:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:28:23.290215 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:28:23.290224 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:28:23.290233 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:28:23.290244 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:28:23.290254 kernel: audit: type=1334 audit(1712946502.537:91): prog-id=12 op=LOAD Apr 12 18:28:23.290263 kernel: audit: type=1334 audit(1712946502.537:92): prog-id=3 op=UNLOAD Apr 12 18:28:23.290271 kernel: audit: type=1334 audit(1712946502.544:93): prog-id=13 op=LOAD Apr 12 18:28:23.290280 kernel: audit: type=1334 audit(1712946502.550:94): prog-id=14 op=LOAD Apr 12 18:28:23.290288 kernel: audit: type=1334 audit(1712946502.550:95): prog-id=4 op=UNLOAD Apr 12 18:28:23.290297 kernel: audit: type=1334 audit(1712946502.550:96): prog-id=5 op=UNLOAD Apr 12 18:28:23.290307 kernel: audit: type=1334 audit(1712946502.556:97): prog-id=15 op=LOAD Apr 12 18:28:23.290316 kernel: audit: type=1334 audit(1712946502.556:98): prog-id=12 op=UNLOAD Apr 12 18:28:23.290326 kernel: audit: type=1334 audit(1712946502.562:99): prog-id=16 op=LOAD Apr 12 18:28:23.290335 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:28:23.290344 kernel: audit: type=1334 audit(1712946502.567:100): prog-id=17 op=LOAD Apr 12 18:28:23.290352 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:28:23.290362 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:28:23.290372 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:28:23.290381 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:28:23.290394 systemd[1]: Created slice system-getty.slice. Apr 12 18:28:23.290404 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:28:23.290413 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:28:23.290423 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:28:23.290433 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:28:23.290442 systemd[1]: Created slice user.slice. Apr 12 18:28:23.290451 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:28:23.290460 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:28:23.290470 systemd[1]: Set up automount boot.automount. Apr 12 18:28:23.290480 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:28:23.290490 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:28:23.290499 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:28:23.290508 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:28:23.290517 systemd[1]: Reached target integritysetup.target. Apr 12 18:28:23.290527 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:28:23.290536 systemd[1]: Reached target remote-fs.target. Apr 12 18:28:23.290545 systemd[1]: Reached target slices.target. Apr 12 18:28:23.290556 systemd[1]: Reached target swap.target. Apr 12 18:28:23.290577 systemd[1]: Reached target torcx.target. Apr 12 18:28:23.290587 systemd[1]: Reached target veritysetup.target. Apr 12 18:28:23.290596 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:28:23.290607 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:28:23.290617 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:28:23.290629 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:28:23.290638 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:28:23.290647 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:28:23.290657 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:28:23.290667 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:28:23.290676 systemd[1]: Mounting media.mount... Apr 12 18:28:23.290685 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:28:23.290694 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:28:23.290705 systemd[1]: Mounting tmp.mount... Apr 12 18:28:23.290715 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:28:23.290737 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:28:23.290747 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:28:23.290757 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:28:23.290766 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:28:23.290776 systemd[1]: Starting modprobe@drm.service... Apr 12 18:28:23.290785 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:28:23.290795 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:28:23.290807 systemd[1]: Starting modprobe@loop.service... Apr 12 18:28:23.290817 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:28:23.290829 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:28:23.290838 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:28:23.290847 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:28:23.290857 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:28:23.290866 kernel: fuse: init (API version 7.34) Apr 12 18:28:23.290875 systemd[1]: Stopped systemd-journald.service. Apr 12 18:28:23.290886 kernel: loop: module loaded Apr 12 18:28:23.290895 systemd[1]: systemd-journald.service: Consumed 3.114s CPU time. Apr 12 18:28:23.290904 systemd[1]: Starting systemd-journald.service... Apr 12 18:28:23.290914 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:28:23.290924 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:28:23.290933 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:28:23.290942 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:28:23.290951 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:28:23.290961 systemd[1]: Stopped verity-setup.service. Apr 12 18:28:23.290971 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:28:23.290981 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:28:23.290990 systemd[1]: Mounted media.mount. Apr 12 18:28:23.290999 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:28:23.291009 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:28:23.291018 systemd[1]: Mounted tmp.mount. Apr 12 18:28:23.291034 systemd-journald[1139]: Journal started Apr 12 18:28:23.291090 systemd-journald[1139]: Runtime Journal (/run/log/journal/9bab8ff607dc4c29bef1839a1c9a57a1) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:28:11.436000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:28:12.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:28:12.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:28:12.432000 audit: BPF prog-id=10 op=LOAD Apr 12 18:28:12.432000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:28:12.432000 audit: BPF prog-id=11 op=LOAD Apr 12 18:28:12.433000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:28:14.112000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:28:14.112000 audit[1033]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400002226c a1=4000028300 a2=4000026700 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:14.112000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:28:14.126000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:28:14.126000 audit[1033]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022349 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:14.126000 audit: CWD cwd="/" Apr 12 18:28:14.126000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:14.126000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:14.126000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:28:22.537000 audit: BPF prog-id=12 op=LOAD Apr 12 18:28:22.537000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:28:22.544000 audit: BPF prog-id=13 op=LOAD Apr 12 18:28:22.550000 audit: BPF prog-id=14 op=LOAD Apr 12 18:28:22.550000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:28:22.550000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:28:22.556000 audit: BPF prog-id=15 op=LOAD Apr 12 18:28:22.556000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:28:22.562000 audit: BPF prog-id=16 op=LOAD Apr 12 18:28:22.567000 audit: BPF prog-id=17 op=LOAD Apr 12 18:28:22.567000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:28:22.567000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:28:22.573000 audit: BPF prog-id=18 op=LOAD Apr 12 18:28:22.573000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:28:22.578000 audit: BPF prog-id=19 op=LOAD Apr 12 18:28:22.584000 audit: BPF prog-id=20 op=LOAD Apr 12 18:28:22.584000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:28:22.584000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:28:22.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:22.608000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:28:22.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:22.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.158000 audit: BPF prog-id=21 op=LOAD Apr 12 18:28:23.158000 audit: BPF prog-id=22 op=LOAD Apr 12 18:28:23.158000 audit: BPF prog-id=23 op=LOAD Apr 12 18:28:23.158000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:28:23.158000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:28:23.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.286000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:28:23.286000 audit[1139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc5e80fc0 a2=4000 a3=1 items=0 ppid=1 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:23.286000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:28:22.536512 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:28:14.040514 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:28:22.585771 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:28:14.061669 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:28:22.586142 systemd[1]: systemd-journald.service: Consumed 3.114s CPU time. Apr 12 18:28:14.061688 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:28:14.061725 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:28:14.061735 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:28:14.061781 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:28:14.061793 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:28:14.061998 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:28:14.062033 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:28:14.062044 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:28:14.094975 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:28:14.095039 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:28:14.095073 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:28:14.095088 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:28:14.095109 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:28:14.095122 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:28:20.891430 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:28:20.891708 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:28:20.891809 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:28:20.891968 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:28:20.892017 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:28:20.892071 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2024-04-12T18:28:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:28:23.304595 systemd[1]: Started systemd-journald.service. Apr 12 18:28:23.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.305547 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:28:23.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.311379 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:28:23.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.316428 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:28:23.316575 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:28:23.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.321342 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:28:23.321467 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:28:23.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.326842 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:28:23.326975 systemd[1]: Finished modprobe@drm.service. Apr 12 18:28:23.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.331672 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:28:23.331795 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:28:23.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.337160 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:28:23.337283 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:28:23.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.342032 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:28:23.342155 systemd[1]: Finished modprobe@loop.service. Apr 12 18:28:23.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.346744 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:28:23.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.352235 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:28:23.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.357857 systemd[1]: Reached target network-pre.target. Apr 12 18:28:23.363678 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:28:23.369293 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:28:23.373638 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:28:23.392232 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:28:23.398091 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:28:23.402606 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:28:23.403904 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:28:23.408781 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:28:23.410006 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:28:23.416840 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:28:23.421911 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:28:23.433886 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:28:23.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.439278 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:28:23.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.445412 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:28:23.451524 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:28:23.463082 udevadm[1153]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:28:23.473810 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:28:23.475863 systemd-journald[1139]: Time spent on flushing to /var/log/journal/9bab8ff607dc4c29bef1839a1c9a57a1 is 14.678ms for 1140 entries. Apr 12 18:28:23.475863 systemd-journald[1139]: System Journal (/var/log/journal/9bab8ff607dc4c29bef1839a1c9a57a1) is 8.0M, max 2.6G, 2.6G free. Apr 12 18:28:23.570643 systemd-journald[1139]: Received client request to flush runtime journal. Apr 12 18:28:23.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:23.484851 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:28:23.555958 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:28:23.571605 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:28:23.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:24.418447 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:28:24.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:24.424437 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:28:24.812129 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:28:24.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:25.025732 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:28:25.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:25.031000 audit: BPF prog-id=24 op=LOAD Apr 12 18:28:25.031000 audit: BPF prog-id=25 op=LOAD Apr 12 18:28:25.031000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:28:25.031000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:28:25.032403 systemd[1]: Starting systemd-udevd.service... Apr 12 18:28:25.051087 systemd-udevd[1158]: Using default interface naming scheme 'v252'. Apr 12 18:28:25.514216 systemd[1]: Started systemd-udevd.service. Apr 12 18:28:25.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:25.523000 audit: BPF prog-id=26 op=LOAD Apr 12 18:28:25.526404 systemd[1]: Starting systemd-networkd.service... Apr 12 18:28:25.554750 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:28:25.608000 audit: BPF prog-id=27 op=LOAD Apr 12 18:28:25.608000 audit: BPF prog-id=28 op=LOAD Apr 12 18:28:25.608000 audit: BPF prog-id=29 op=LOAD Apr 12 18:28:25.610186 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:28:25.643605 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:28:25.697540 kernel: hv_vmbus: registering driver hyperv_fb Apr 12 18:28:25.697637 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Apr 12 18:28:25.704589 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Apr 12 18:28:25.709678 kernel: Console: switching to colour dummy device 80x25 Apr 12 18:28:25.711584 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:28:25.724859 systemd[1]: Started systemd-userdbd.service. Apr 12 18:28:25.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:25.722000 audit[1175]: AVC avc: denied { confidentiality } for pid=1175 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:28:25.743590 kernel: hv_utils: Registering HyperV Utility Driver Apr 12 18:28:25.743661 kernel: hv_vmbus: registering driver hv_balloon Apr 12 18:28:25.743676 kernel: hv_vmbus: registering driver hv_utils Apr 12 18:28:25.750596 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Apr 12 18:28:25.755478 kernel: hv_balloon: Memory hot add disabled on ARM64 Apr 12 18:28:25.755790 kernel: hv_utils: Heartbeat IC version 3.0 Apr 12 18:28:25.755851 kernel: hv_utils: Shutdown IC version 3.2 Apr 12 18:28:25.755867 kernel: hv_utils: TimeSync IC version 4.0 Apr 12 18:28:25.722000 audit[1175]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaba3bcd50 a1=aa2c a2=ffff810324b0 a3=aaaaba316010 items=12 ppid=1158 pid=1175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:25.722000 audit: CWD cwd="/" Apr 12 18:28:25.722000 audit: PATH item=0 name=(null) inode=7209 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=1 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=2 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=3 name=(null) inode=10711 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=4 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=5 name=(null) inode=10712 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.671995 systemd-journald[1139]: Time jumped backwards, rotating. Apr 12 18:28:25.722000 audit: PATH item=6 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=7 name=(null) inode=10713 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=8 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=9 name=(null) inode=10714 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=10 name=(null) inode=10710 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PATH item=11 name=(null) inode=10715 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:28:25.722000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:28:25.778528 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1176) Apr 12 18:28:25.797408 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:28:25.803153 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:28:25.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:25.809294 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:28:26.037691 systemd-networkd[1179]: lo: Link UP Apr 12 18:28:26.037703 systemd-networkd[1179]: lo: Gained carrier Apr 12 18:28:26.038105 systemd-networkd[1179]: Enumeration completed Apr 12 18:28:26.038238 systemd[1]: Started systemd-networkd.service. Apr 12 18:28:26.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:26.044539 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:28:26.073397 systemd-networkd[1179]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:28:26.121530 kernel: mlx5_core b2ec:00:02.0 enP45804s1: Link up Apr 12 18:28:26.148388 systemd-networkd[1179]: enP45804s1: Link UP Apr 12 18:28:26.148520 kernel: hv_netvsc 000d3a06-0630-000d-3a06-0630000d3a06 eth0: Data path switched to VF: enP45804s1 Apr 12 18:28:26.148486 systemd-networkd[1179]: eth0: Link UP Apr 12 18:28:26.148494 systemd-networkd[1179]: eth0: Gained carrier Apr 12 18:28:26.152763 systemd-networkd[1179]: enP45804s1: Gained carrier Apr 12 18:28:26.162614 systemd-networkd[1179]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:28:26.360722 lvm[1236]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:28:26.406444 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:28:26.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:26.411607 systemd[1]: Reached target cryptsetup.target. Apr 12 18:28:26.418126 systemd[1]: Starting lvm2-activation.service... Apr 12 18:28:26.422472 lvm[1239]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:28:26.441424 systemd[1]: Finished lvm2-activation.service. Apr 12 18:28:26.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:26.446049 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:28:26.450663 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:28:26.450693 systemd[1]: Reached target local-fs.target. Apr 12 18:28:26.455082 systemd[1]: Reached target machines.target. Apr 12 18:28:26.460517 systemd[1]: Starting ldconfig.service... Apr 12 18:28:26.479470 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:28:26.479552 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:28:26.480791 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:28:26.486158 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:28:26.492920 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:28:26.497779 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:28:26.497840 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:28:26.499159 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:28:26.512885 systemd-tmpfiles[1244]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:28:26.531929 systemd-tmpfiles[1244]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:28:26.558692 systemd-tmpfiles[1244]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:28:26.589566 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1241 (bootctl) Apr 12 18:28:26.590861 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:28:27.114744 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:28:27.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:27.240427 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:28:27.241060 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:28:27.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:27.336137 systemd-fsck[1249]: fsck.fat 4.2 (2021-01-31) Apr 12 18:28:27.336137 systemd-fsck[1249]: /dev/sda1: 236 files, 117047/258078 clusters Apr 12 18:28:27.340570 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:28:27.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:27.349839 systemd[1]: Mounting boot.mount... Apr 12 18:28:27.359900 systemd[1]: Mounted boot.mount. Apr 12 18:28:27.369958 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:28:27.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:27.409658 systemd-networkd[1179]: eth0: Gained IPv6LL Apr 12 18:28:27.416460 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:28:27.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:27.426016 kernel: kauditd_printk_skb: 84 callbacks suppressed Apr 12 18:28:27.426114 kernel: audit: type=1130 audit(1712946507.421:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.500790 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:28:28.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.507357 systemd[1]: Starting audit-rules.service... Apr 12 18:28:28.525521 kernel: audit: type=1130 audit(1712946508.505:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.529634 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:28:28.536980 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:28:28.543000 audit: BPF prog-id=30 op=LOAD Apr 12 18:28:28.550036 systemd[1]: Starting systemd-resolved.service... Apr 12 18:28:28.552553 kernel: audit: type=1334 audit(1712946508.543:170): prog-id=30 op=LOAD Apr 12 18:28:28.555000 audit: BPF prog-id=31 op=LOAD Apr 12 18:28:28.561908 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:28:28.563517 kernel: audit: type=1334 audit(1712946508.555:171): prog-id=31 op=LOAD Apr 12 18:28:28.568198 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:28:28.608347 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:28:28.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.634437 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:28:28.636000 audit[1261]: SYSTEM_BOOT pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.657367 kernel: audit: type=1130 audit(1712946508.613:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.657425 kernel: audit: type=1127 audit(1712946508.636:173): pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.660438 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:28:28.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.686683 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:28:28.687523 kernel: audit: type=1130 audit(1712946508.665:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.692570 systemd[1]: Reached target time-set.target. Apr 12 18:28:28.715482 kernel: audit: type=1130 audit(1712946508.691:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.724902 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:28:28.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.750534 kernel: audit: type=1130 audit(1712946508.729:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.783870 systemd-resolved[1259]: Positive Trust Anchors: Apr 12 18:28:28.784244 systemd-resolved[1259]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:28:28.784327 systemd-resolved[1259]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:28:28.788402 systemd-resolved[1259]: Using system hostname 'ci-3510.3.3-a-2842bd657c'. Apr 12 18:28:28.790139 systemd[1]: Started systemd-resolved.service. Apr 12 18:28:28.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.794886 systemd[1]: Reached target network.target. Apr 12 18:28:28.817687 systemd[1]: Reached target network-online.target. Apr 12 18:28:28.819519 kernel: audit: type=1130 audit(1712946508.794:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:28:28.823643 systemd[1]: Reached target nss-lookup.target. Apr 12 18:28:28.908579 systemd-timesyncd[1260]: Contacted time server 69.10.223.133:123 (0.flatcar.pool.ntp.org). Apr 12 18:28:28.908947 systemd-timesyncd[1260]: Initial clock synchronization to Fri 2024-04-12 18:28:28.925957 UTC. Apr 12 18:28:29.146000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:28:29.146000 audit[1276]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdd869a60 a2=420 a3=0 items=0 ppid=1255 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:28:29.146000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:28:29.147122 augenrules[1276]: No rules Apr 12 18:28:29.147609 systemd[1]: Finished audit-rules.service. Apr 12 18:28:36.725669 ldconfig[1240]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:28:36.735801 systemd[1]: Finished ldconfig.service. Apr 12 18:28:36.741997 systemd[1]: Starting systemd-update-done.service... Apr 12 18:28:36.770019 systemd[1]: Finished systemd-update-done.service. Apr 12 18:28:36.774935 systemd[1]: Reached target sysinit.target. Apr 12 18:28:36.779256 systemd[1]: Started motdgen.path. Apr 12 18:28:36.783106 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:28:36.789285 systemd[1]: Started logrotate.timer. Apr 12 18:28:36.793235 systemd[1]: Started mdadm.timer. Apr 12 18:28:36.796827 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:28:36.801406 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:28:36.801440 systemd[1]: Reached target paths.target. Apr 12 18:28:36.805537 systemd[1]: Reached target timers.target. Apr 12 18:28:36.810188 systemd[1]: Listening on dbus.socket. Apr 12 18:28:36.815396 systemd[1]: Starting docker.socket... Apr 12 18:28:36.836377 systemd[1]: Listening on sshd.socket. Apr 12 18:28:36.840437 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:28:36.840994 systemd[1]: Listening on docker.socket. Apr 12 18:28:36.845175 systemd[1]: Reached target sockets.target. Apr 12 18:28:36.849371 systemd[1]: Reached target basic.target. Apr 12 18:28:36.854124 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:28:36.854150 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:28:36.855286 systemd[1]: Starting containerd.service... Apr 12 18:28:36.860568 systemd[1]: Starting dbus.service... Apr 12 18:28:36.865175 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:28:36.870959 systemd[1]: Starting extend-filesystems.service... Apr 12 18:28:36.878008 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:28:36.879229 systemd[1]: Starting motdgen.service... Apr 12 18:28:36.883883 systemd[1]: Started nvidia.service. Apr 12 18:28:36.889116 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:28:36.894694 systemd[1]: Starting prepare-critools.service... Apr 12 18:28:36.900008 systemd[1]: Starting prepare-helm.service... Apr 12 18:28:36.905865 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:28:36.911400 systemd[1]: Starting sshd-keygen.service... Apr 12 18:28:36.920264 systemd[1]: Starting systemd-logind.service... Apr 12 18:28:36.926609 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:28:36.926677 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:28:36.927159 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:28:36.928003 systemd[1]: Starting update-engine.service... Apr 12 18:28:36.933962 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:28:36.944890 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:28:36.945075 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:28:36.954035 jq[1305]: true Apr 12 18:28:36.954289 jq[1286]: false Apr 12 18:28:36.973215 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:28:36.973381 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:28:36.975150 extend-filesystems[1287]: Found sda Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda1 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda2 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda3 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found usr Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda4 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda6 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda7 Apr 12 18:28:36.980397 extend-filesystems[1287]: Found sda9 Apr 12 18:28:36.980397 extend-filesystems[1287]: Checking size of /dev/sda9 Apr 12 18:28:37.013291 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:28:37.013475 systemd[1]: Finished motdgen.service. Apr 12 18:28:37.030351 jq[1311]: true Apr 12 18:28:37.056080 systemd-logind[1300]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:28:37.059661 systemd-logind[1300]: New seat seat0. Apr 12 18:28:37.073912 env[1313]: time="2024-04-12T18:28:37.073856486Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:28:37.099776 env[1313]: time="2024-04-12T18:28:37.099724796Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:28:37.100061 env[1313]: time="2024-04-12T18:28:37.100044044Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.101627 env[1313]: time="2024-04-12T18:28:37.101581807Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:28:37.101742 env[1313]: time="2024-04-12T18:28:37.101727342Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.102075 env[1313]: time="2024-04-12T18:28:37.102049832Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:28:37.102173 env[1313]: time="2024-04-12T18:28:37.102158022Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.102243 env[1313]: time="2024-04-12T18:28:37.102228228Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:28:37.102292 env[1313]: time="2024-04-12T18:28:37.102279502Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.102424 env[1313]: time="2024-04-12T18:28:37.102408786Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.103493 env[1313]: time="2024-04-12T18:28:37.103461993Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:28:37.103794 env[1313]: time="2024-04-12T18:28:37.103769994Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:28:37.103873 env[1313]: time="2024-04-12T18:28:37.103859612Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:28:37.104080 env[1313]: time="2024-04-12T18:28:37.104061784Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:28:37.104142 env[1313]: time="2024-04-12T18:28:37.104129828Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:28:37.115676 extend-filesystems[1287]: Old size kept for /dev/sda9 Apr 12 18:28:37.127183 extend-filesystems[1287]: Found sr0 Apr 12 18:28:37.120642 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:28:37.120848 systemd[1]: Finished extend-filesystems.service. Apr 12 18:28:37.137022 env[1313]: time="2024-04-12T18:28:37.136964201Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:28:37.137022 env[1313]: time="2024-04-12T18:28:37.137018436Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:28:37.137160 env[1313]: time="2024-04-12T18:28:37.137033846Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:28:37.137160 env[1313]: time="2024-04-12T18:28:37.137071751Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137160 env[1313]: time="2024-04-12T18:28:37.137086441Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137160 env[1313]: time="2024-04-12T18:28:37.137100330Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137160 env[1313]: time="2024-04-12T18:28:37.137113458Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137492 env[1313]: time="2024-04-12T18:28:37.137462966Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137492 env[1313]: time="2024-04-12T18:28:37.137486622Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137492 env[1313]: time="2024-04-12T18:28:37.137516081Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137609 env[1313]: time="2024-04-12T18:28:37.137531051Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.137609 env[1313]: time="2024-04-12T18:28:37.137544699Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:28:37.137720 env[1313]: time="2024-04-12T18:28:37.137695077Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:28:37.137798 env[1313]: time="2024-04-12T18:28:37.137777371Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:28:37.138030 env[1313]: time="2024-04-12T18:28:37.138008282Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:28:37.138069 env[1313]: time="2024-04-12T18:28:37.138037101Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138069 env[1313]: time="2024-04-12T18:28:37.138053631Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:28:37.138109 env[1313]: time="2024-04-12T18:28:37.138100702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138135 env[1313]: time="2024-04-12T18:28:37.138113751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138135 env[1313]: time="2024-04-12T18:28:37.138126319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138173 env[1313]: time="2024-04-12T18:28:37.138140728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138173 env[1313]: time="2024-04-12T18:28:37.138152936Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138173 env[1313]: time="2024-04-12T18:28:37.138165344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138228 env[1313]: time="2024-04-12T18:28:37.138176471Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138228 env[1313]: time="2024-04-12T18:28:37.138188159Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138228 env[1313]: time="2024-04-12T18:28:37.138201047Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:28:37.138347 env[1313]: time="2024-04-12T18:28:37.138323767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138347 env[1313]: time="2024-04-12T18:28:37.138344981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138402 env[1313]: time="2024-04-12T18:28:37.138357309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138402 env[1313]: time="2024-04-12T18:28:37.138369317Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:28:37.138402 env[1313]: time="2024-04-12T18:28:37.138385688Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:28:37.138402 env[1313]: time="2024-04-12T18:28:37.138396655Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:28:37.138476 env[1313]: time="2024-04-12T18:28:37.138413226Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:28:37.138476 env[1313]: time="2024-04-12T18:28:37.138446768Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:28:37.138706 env[1313]: time="2024-04-12T18:28:37.138648940Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:28:37.138706 env[1313]: time="2024-04-12T18:28:37.138709379Z" level=info msg="Connect containerd service" Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.138745883Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.139424125Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.139719878Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.139755741Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.146103161Z" level=info msg="containerd successfully booted in 0.073265s" Apr 12 18:28:37.156914 env[1313]: time="2024-04-12T18:28:37.156889715Z" level=info msg="Start subscribing containerd event" Apr 12 18:28:37.157063 tar[1308]: crictl Apr 12 18:28:37.157262 tar[1309]: linux-arm64/helm Apr 12 18:28:37.139876 systemd[1]: Started containerd.service. Apr 12 18:28:37.157434 tar[1307]: ./ Apr 12 18:28:37.157434 tar[1307]: ./loopback Apr 12 18:28:37.157643 env[1313]: time="2024-04-12T18:28:37.157065990Z" level=info msg="Start recovering state" Apr 12 18:28:37.157643 env[1313]: time="2024-04-12T18:28:37.157148844Z" level=info msg="Start event monitor" Apr 12 18:28:37.157643 env[1313]: time="2024-04-12T18:28:37.157168257Z" level=info msg="Start snapshots syncer" Apr 12 18:28:37.157643 env[1313]: time="2024-04-12T18:28:37.157183627Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:28:37.157643 env[1313]: time="2024-04-12T18:28:37.157192673Z" level=info msg="Start streaming server" Apr 12 18:28:37.167369 bash[1333]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:28:37.168192 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:28:37.247096 tar[1307]: ./bandwidth Apr 12 18:28:37.308151 dbus-daemon[1285]: [system] SELinux support is enabled Apr 12 18:28:37.308323 systemd[1]: Started dbus.service. Apr 12 18:28:37.315930 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:28:37.315961 systemd[1]: Reached target system-config.target. Apr 12 18:28:37.326039 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:28:37.326066 systemd[1]: Reached target user-config.target. Apr 12 18:28:37.334645 systemd[1]: Started systemd-logind.service. Apr 12 18:28:37.340132 dbus-daemon[1285]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:28:37.371364 tar[1307]: ./ptp Apr 12 18:28:37.410101 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:28:37.461490 tar[1307]: ./vlan Apr 12 18:28:37.529205 tar[1307]: ./host-device Apr 12 18:28:37.602818 tar[1307]: ./tuning Apr 12 18:28:37.671651 tar[1307]: ./vrf Apr 12 18:28:37.738909 tar[1307]: ./sbr Apr 12 18:28:37.806606 tar[1307]: ./tap Apr 12 18:28:37.883350 tar[1307]: ./dhcp Apr 12 18:28:37.988128 update_engine[1303]: I0412 18:28:37.972782 1303 main.cc:92] Flatcar Update Engine starting Apr 12 18:28:37.993967 tar[1309]: linux-arm64/LICENSE Apr 12 18:28:37.994090 tar[1309]: linux-arm64/README.md Apr 12 18:28:37.999419 systemd[1]: Finished prepare-helm.service. Apr 12 18:28:38.040620 tar[1307]: ./static Apr 12 18:28:38.056496 systemd[1]: Finished prepare-critools.service. Apr 12 18:28:38.071019 tar[1307]: ./firewall Apr 12 18:28:38.087272 systemd[1]: Started update-engine.service. Apr 12 18:28:38.087590 update_engine[1303]: I0412 18:28:38.087316 1303 update_check_scheduler.cc:74] Next update check in 7m4s Apr 12 18:28:38.093784 systemd[1]: Started locksmithd.service. Apr 12 18:28:38.109429 tar[1307]: ./macvlan Apr 12 18:28:38.145033 tar[1307]: ./dummy Apr 12 18:28:38.178302 tar[1307]: ./bridge Apr 12 18:28:38.214841 tar[1307]: ./ipvlan Apr 12 18:28:38.248010 tar[1307]: ./portmap Apr 12 18:28:38.279900 tar[1307]: ./host-local Apr 12 18:28:38.394016 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:28:39.434281 sshd_keygen[1301]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:28:39.452157 systemd[1]: Finished sshd-keygen.service. Apr 12 18:28:39.458715 systemd[1]: Starting issuegen.service... Apr 12 18:28:39.464430 systemd[1]: Started waagent.service. Apr 12 18:28:39.469748 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:28:39.469923 systemd[1]: Finished issuegen.service. Apr 12 18:28:39.476169 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:28:39.502699 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:28:39.509468 systemd[1]: Started getty@tty1.service. Apr 12 18:28:39.515880 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:28:39.521327 systemd[1]: Reached target getty.target. Apr 12 18:28:39.526050 systemd[1]: Reached target multi-user.target. Apr 12 18:28:39.532489 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:28:39.541589 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:28:39.541772 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:28:39.547684 systemd[1]: Startup finished in 734ms (kernel) + 17.256s (initrd) + 28.802s (userspace) = 46.793s. Apr 12 18:28:39.797560 locksmithd[1390]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:28:40.235697 login[1411]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Apr 12 18:28:40.252940 login[1410]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:28:40.294585 systemd[1]: Created slice user-500.slice. Apr 12 18:28:40.295752 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:28:40.298173 systemd-logind[1300]: New session 2 of user core. Apr 12 18:28:40.353836 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:28:40.355666 systemd[1]: Starting user@500.service... Apr 12 18:28:40.394644 (systemd)[1414]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:28:40.703425 systemd[1414]: Queued start job for default target default.target. Apr 12 18:28:40.703966 systemd[1414]: Reached target paths.target. Apr 12 18:28:40.703987 systemd[1414]: Reached target sockets.target. Apr 12 18:28:40.703998 systemd[1414]: Reached target timers.target. Apr 12 18:28:40.704007 systemd[1414]: Reached target basic.target. Apr 12 18:28:40.704113 systemd[1]: Started user@500.service. Apr 12 18:28:40.705038 systemd[1]: Started session-2.scope. Apr 12 18:28:40.705590 systemd[1414]: Reached target default.target. Apr 12 18:28:40.705820 systemd[1414]: Startup finished in 305ms. Apr 12 18:28:41.237133 login[1411]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:28:41.241248 systemd-logind[1300]: New session 1 of user core. Apr 12 18:28:41.241667 systemd[1]: Started session-1.scope. Apr 12 18:28:48.089464 waagent[1408]: 2024-04-12T18:28:48.089338Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Apr 12 18:28:48.097041 waagent[1408]: 2024-04-12T18:28:48.096938Z INFO Daemon Daemon OS: flatcar 3510.3.3 Apr 12 18:28:48.102321 waagent[1408]: 2024-04-12T18:28:48.102233Z INFO Daemon Daemon Python: 3.9.16 Apr 12 18:28:48.107528 waagent[1408]: 2024-04-12T18:28:48.107418Z INFO Daemon Daemon Run daemon Apr 12 18:28:48.112478 waagent[1408]: 2024-04-12T18:28:48.112395Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.3' Apr 12 18:28:48.132329 waagent[1408]: 2024-04-12T18:28:48.132169Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:28:48.149990 waagent[1408]: 2024-04-12T18:28:48.149836Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:28:48.161358 waagent[1408]: 2024-04-12T18:28:48.161260Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:28:48.167334 waagent[1408]: 2024-04-12T18:28:48.167234Z INFO Daemon Daemon Using waagent for provisioning Apr 12 18:28:48.174390 waagent[1408]: 2024-04-12T18:28:48.174298Z INFO Daemon Daemon Activate resource disk Apr 12 18:28:48.179988 waagent[1408]: 2024-04-12T18:28:48.179887Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Apr 12 18:28:48.196373 waagent[1408]: 2024-04-12T18:28:48.196271Z INFO Daemon Daemon Found device: None Apr 12 18:28:48.201768 waagent[1408]: 2024-04-12T18:28:48.201662Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Apr 12 18:28:48.211583 waagent[1408]: 2024-04-12T18:28:48.211448Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Apr 12 18:28:48.225615 waagent[1408]: 2024-04-12T18:28:48.225528Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:28:48.232315 waagent[1408]: 2024-04-12T18:28:48.232217Z INFO Daemon Daemon Running default provisioning handler Apr 12 18:28:48.246804 waagent[1408]: 2024-04-12T18:28:48.246627Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:28:48.264424 waagent[1408]: 2024-04-12T18:28:48.264262Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:28:48.275801 waagent[1408]: 2024-04-12T18:28:48.275690Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:28:48.281707 waagent[1408]: 2024-04-12T18:28:48.281601Z INFO Daemon Daemon Copying ovf-env.xml Apr 12 18:28:48.396936 waagent[1408]: 2024-04-12T18:28:48.395977Z INFO Daemon Daemon Successfully mounted dvd Apr 12 18:28:48.545950 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Apr 12 18:28:48.586449 waagent[1408]: 2024-04-12T18:28:48.586287Z INFO Daemon Daemon Detect protocol endpoint Apr 12 18:28:48.592073 waagent[1408]: 2024-04-12T18:28:48.591977Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:28:48.598615 waagent[1408]: 2024-04-12T18:28:48.598525Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Apr 12 18:28:48.606195 waagent[1408]: 2024-04-12T18:28:48.606106Z INFO Daemon Daemon Test for route to 168.63.129.16 Apr 12 18:28:48.612435 waagent[1408]: 2024-04-12T18:28:48.612353Z INFO Daemon Daemon Route to 168.63.129.16 exists Apr 12 18:28:48.618092 waagent[1408]: 2024-04-12T18:28:48.618008Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Apr 12 18:28:48.794873 waagent[1408]: 2024-04-12T18:28:48.794744Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Apr 12 18:28:48.802729 waagent[1408]: 2024-04-12T18:28:48.802681Z INFO Daemon Daemon Wire protocol version:2012-11-30 Apr 12 18:28:48.808703 waagent[1408]: 2024-04-12T18:28:48.808616Z INFO Daemon Daemon Server preferred version:2015-04-05 Apr 12 18:28:49.457299 waagent[1408]: 2024-04-12T18:28:49.457126Z INFO Daemon Daemon Initializing goal state during protocol detection Apr 12 18:28:49.472401 waagent[1408]: 2024-04-12T18:28:49.472303Z INFO Daemon Daemon Forcing an update of the goal state.. Apr 12 18:28:49.478280 waagent[1408]: 2024-04-12T18:28:49.478186Z INFO Daemon Daemon Fetching goal state [incarnation 1] Apr 12 18:28:49.557132 waagent[1408]: 2024-04-12T18:28:49.556971Z INFO Daemon Daemon Found private key matching thumbprint D0FD3BFE36927539AFB9FA60E86719744465AA26 Apr 12 18:28:49.566589 waagent[1408]: 2024-04-12T18:28:49.566488Z INFO Daemon Daemon Certificate with thumbprint B3755A01C28B269131F46B9BE60BB3258249FEB6 has no matching private key. Apr 12 18:28:49.577284 waagent[1408]: 2024-04-12T18:28:49.577194Z INFO Daemon Daemon Fetch goal state completed Apr 12 18:28:49.625570 waagent[1408]: 2024-04-12T18:28:49.625492Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 9580e3b1-8a4d-4b36-94d6-656feb80a4cf New eTag: 5995850627269319960] Apr 12 18:28:49.637460 waagent[1408]: 2024-04-12T18:28:49.637368Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:28:49.653745 waagent[1408]: 2024-04-12T18:28:49.653657Z INFO Daemon Daemon Starting provisioning Apr 12 18:28:49.659322 waagent[1408]: 2024-04-12T18:28:49.659229Z INFO Daemon Daemon Handle ovf-env.xml. Apr 12 18:28:49.664852 waagent[1408]: 2024-04-12T18:28:49.664769Z INFO Daemon Daemon Set hostname [ci-3510.3.3-a-2842bd657c] Apr 12 18:28:49.707252 waagent[1408]: 2024-04-12T18:28:49.707099Z INFO Daemon Daemon Publish hostname [ci-3510.3.3-a-2842bd657c] Apr 12 18:28:49.714366 waagent[1408]: 2024-04-12T18:28:49.714244Z INFO Daemon Daemon Examine /proc/net/route for primary interface Apr 12 18:28:49.722195 waagent[1408]: 2024-04-12T18:28:49.722113Z INFO Daemon Daemon Primary interface is [eth0] Apr 12 18:28:49.739972 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Apr 12 18:28:49.740151 systemd[1]: Stopped systemd-networkd-wait-online.service. Apr 12 18:28:49.740210 systemd[1]: Stopping systemd-networkd-wait-online.service... Apr 12 18:28:49.740461 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:28:49.745565 systemd-networkd[1179]: eth0: DHCPv6 lease lost Apr 12 18:28:49.747401 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:28:49.747619 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:28:49.749874 systemd[1]: Starting systemd-networkd.service... Apr 12 18:28:49.778177 systemd-networkd[1458]: enP45804s1: Link UP Apr 12 18:28:49.778189 systemd-networkd[1458]: enP45804s1: Gained carrier Apr 12 18:28:49.779099 systemd-networkd[1458]: eth0: Link UP Apr 12 18:28:49.779110 systemd-networkd[1458]: eth0: Gained carrier Apr 12 18:28:49.779423 systemd-networkd[1458]: lo: Link UP Apr 12 18:28:49.779433 systemd-networkd[1458]: lo: Gained carrier Apr 12 18:28:49.779775 systemd-networkd[1458]: eth0: Gained IPv6LL Apr 12 18:28:49.779987 systemd-networkd[1458]: Enumeration completed Apr 12 18:28:49.780105 systemd[1]: Started systemd-networkd.service. Apr 12 18:28:49.782029 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:28:49.786571 waagent[1408]: 2024-04-12T18:28:49.785899Z INFO Daemon Daemon Create user account if not exists Apr 12 18:28:49.786783 systemd-networkd[1458]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:28:49.794066 waagent[1408]: 2024-04-12T18:28:49.793963Z INFO Daemon Daemon User core already exists, skip useradd Apr 12 18:28:49.801033 waagent[1408]: 2024-04-12T18:28:49.800926Z INFO Daemon Daemon Configure sudoer Apr 12 18:28:49.809661 waagent[1408]: 2024-04-12T18:28:49.809493Z INFO Daemon Daemon Configure sshd Apr 12 18:28:49.814646 systemd-networkd[1458]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:28:49.816920 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:28:49.817793 waagent[1408]: 2024-04-12T18:28:49.816681Z INFO Daemon Daemon Deploy ssh public key. Apr 12 18:28:51.056354 waagent[1408]: 2024-04-12T18:28:51.056265Z INFO Daemon Daemon Provisioning complete Apr 12 18:28:51.078961 waagent[1408]: 2024-04-12T18:28:51.078889Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Apr 12 18:28:51.085681 waagent[1408]: 2024-04-12T18:28:51.085586Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Apr 12 18:28:51.097798 waagent[1408]: 2024-04-12T18:28:51.097702Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Apr 12 18:28:51.419157 waagent[1467]: 2024-04-12T18:28:51.418995Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Apr 12 18:28:51.420322 waagent[1467]: 2024-04-12T18:28:51.420251Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:51.420611 waagent[1467]: 2024-04-12T18:28:51.420558Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:51.435180 waagent[1467]: 2024-04-12T18:28:51.435069Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Apr 12 18:28:51.435567 waagent[1467]: 2024-04-12T18:28:51.435489Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Apr 12 18:28:51.511868 waagent[1467]: 2024-04-12T18:28:51.511715Z INFO ExtHandler ExtHandler Found private key matching thumbprint D0FD3BFE36927539AFB9FA60E86719744465AA26 Apr 12 18:28:51.512273 waagent[1467]: 2024-04-12T18:28:51.512217Z INFO ExtHandler ExtHandler Certificate with thumbprint B3755A01C28B269131F46B9BE60BB3258249FEB6 has no matching private key. Apr 12 18:28:51.512626 waagent[1467]: 2024-04-12T18:28:51.512571Z INFO ExtHandler ExtHandler Fetch goal state completed Apr 12 18:28:51.526943 waagent[1467]: 2024-04-12T18:28:51.526881Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a328b461-3a40-4d76-b8e4-5e17678759c1 New eTag: 5995850627269319960] Apr 12 18:28:51.527838 waagent[1467]: 2024-04-12T18:28:51.527764Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:28:51.648655 waagent[1467]: 2024-04-12T18:28:51.648484Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:28:51.659492 waagent[1467]: 2024-04-12T18:28:51.659397Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1467 Apr 12 18:28:51.663770 waagent[1467]: 2024-04-12T18:28:51.663672Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:28:51.665372 waagent[1467]: 2024-04-12T18:28:51.665295Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:28:51.820610 waagent[1467]: 2024-04-12T18:28:51.820467Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:28:51.821226 waagent[1467]: 2024-04-12T18:28:51.821157Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:28:51.829561 waagent[1467]: 2024-04-12T18:28:51.829476Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:28:51.830327 waagent[1467]: 2024-04-12T18:28:51.830256Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:28:51.831708 waagent[1467]: 2024-04-12T18:28:51.831635Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Apr 12 18:28:51.833337 waagent[1467]: 2024-04-12T18:28:51.833259Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:28:51.833631 waagent[1467]: 2024-04-12T18:28:51.833556Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:51.834248 waagent[1467]: 2024-04-12T18:28:51.834169Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:51.834923 waagent[1467]: 2024-04-12T18:28:51.834855Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:28:51.835273 waagent[1467]: 2024-04-12T18:28:51.835213Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:28:51.835273 waagent[1467]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:28:51.835273 waagent[1467]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:28:51.835273 waagent[1467]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:28:51.835273 waagent[1467]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:51.835273 waagent[1467]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:51.835273 waagent[1467]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:51.837895 waagent[1467]: 2024-04-12T18:28:51.837712Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:28:51.838268 waagent[1467]: 2024-04-12T18:28:51.838194Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:51.839126 waagent[1467]: 2024-04-12T18:28:51.839046Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:51.839794 waagent[1467]: 2024-04-12T18:28:51.839717Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:28:51.839958 waagent[1467]: 2024-04-12T18:28:51.839908Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:28:51.840132 waagent[1467]: 2024-04-12T18:28:51.840090Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:28:51.841083 waagent[1467]: 2024-04-12T18:28:51.841024Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:28:51.841238 waagent[1467]: 2024-04-12T18:28:51.841168Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:28:51.842061 waagent[1467]: 2024-04-12T18:28:51.841967Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:28:51.842257 waagent[1467]: 2024-04-12T18:28:51.842186Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:28:51.842584 waagent[1467]: 2024-04-12T18:28:51.842491Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:28:51.853482 waagent[1467]: 2024-04-12T18:28:51.853404Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Apr 12 18:28:51.855051 waagent[1467]: 2024-04-12T18:28:51.854980Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:28:51.857078 waagent[1467]: 2024-04-12T18:28:51.857013Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Apr 12 18:28:51.891053 waagent[1467]: 2024-04-12T18:28:51.890903Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1458' Apr 12 18:28:51.899372 waagent[1467]: 2024-04-12T18:28:51.899285Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Apr 12 18:28:51.969038 waagent[1467]: 2024-04-12T18:28:51.968885Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:28:51.969038 waagent[1467]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:28:51.969038 waagent[1467]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:28:51.969038 waagent[1467]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:06:30 brd ff:ff:ff:ff:ff:ff Apr 12 18:28:51.969038 waagent[1467]: 3: enP45804s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:06:30 brd ff:ff:ff:ff:ff:ff\ altname enP45804p0s2 Apr 12 18:28:51.969038 waagent[1467]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:28:51.969038 waagent[1467]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:28:51.969038 waagent[1467]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:28:51.969038 waagent[1467]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:28:51.969038 waagent[1467]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:28:51.969038 waagent[1467]: 2: eth0 inet6 fe80::20d:3aff:fe06:630/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:28:52.043949 waagent[1467]: 2024-04-12T18:28:52.043880Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.8 -- exiting Apr 12 18:28:53.102588 waagent[1408]: 2024-04-12T18:28:53.102438Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Apr 12 18:28:53.109094 waagent[1408]: 2024-04-12T18:28:53.109033Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.8 to be the latest agent Apr 12 18:28:54.335490 waagent[1498]: 2024-04-12T18:28:54.335383Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.8) Apr 12 18:28:54.336673 waagent[1498]: 2024-04-12T18:28:54.336602Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.3 Apr 12 18:28:54.336931 waagent[1498]: 2024-04-12T18:28:54.336881Z INFO ExtHandler ExtHandler Python: 3.9.16 Apr 12 18:28:54.337147 waagent[1498]: 2024-04-12T18:28:54.337099Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Apr 12 18:28:54.346252 waagent[1498]: 2024-04-12T18:28:54.346090Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:28:54.346946 waagent[1498]: 2024-04-12T18:28:54.346879Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:54.347225 waagent[1498]: 2024-04-12T18:28:54.347174Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:54.362933 waagent[1498]: 2024-04-12T18:28:54.362827Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Apr 12 18:28:54.377606 waagent[1498]: 2024-04-12T18:28:54.377533Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.149 Apr 12 18:28:54.378997 waagent[1498]: 2024-04-12T18:28:54.378930Z INFO ExtHandler Apr 12 18:28:54.379296 waagent[1498]: 2024-04-12T18:28:54.379244Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 67bef613-ffbf-4ed1-9c12-0173d2ba1dfd eTag: 5995850627269319960 source: Fabric] Apr 12 18:28:54.380231 waagent[1498]: 2024-04-12T18:28:54.380171Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Apr 12 18:28:54.381685 waagent[1498]: 2024-04-12T18:28:54.381619Z INFO ExtHandler Apr 12 18:28:54.381943 waagent[1498]: 2024-04-12T18:28:54.381893Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Apr 12 18:28:54.389067 waagent[1498]: 2024-04-12T18:28:54.389008Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Apr 12 18:28:54.389808 waagent[1498]: 2024-04-12T18:28:54.389753Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:28:54.411029 waagent[1498]: 2024-04-12T18:28:54.410957Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Apr 12 18:28:54.486218 waagent[1498]: 2024-04-12T18:28:54.486059Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D0FD3BFE36927539AFB9FA60E86719744465AA26', 'hasPrivateKey': True} Apr 12 18:28:54.487694 waagent[1498]: 2024-04-12T18:28:54.487619Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B3755A01C28B269131F46B9BE60BB3258249FEB6', 'hasPrivateKey': False} Apr 12 18:28:54.489025 waagent[1498]: 2024-04-12T18:28:54.488959Z INFO ExtHandler Fetch goal state completed Apr 12 18:28:54.513825 waagent[1498]: 2024-04-12T18:28:54.513683Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Apr 12 18:28:54.527851 waagent[1498]: 2024-04-12T18:28:54.527730Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.8 running as process 1498 Apr 12 18:28:54.531944 waagent[1498]: 2024-04-12T18:28:54.531842Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:28:54.533688 waagent[1498]: 2024-04-12T18:28:54.533601Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:28:54.539711 waagent[1498]: 2024-04-12T18:28:54.539642Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:28:54.540354 waagent[1498]: 2024-04-12T18:28:54.540290Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:28:54.549223 waagent[1498]: 2024-04-12T18:28:54.549161Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:28:54.550036 waagent[1498]: 2024-04-12T18:28:54.549965Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:28:54.557439 waagent[1498]: 2024-04-12T18:28:54.557300Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Apr 12 18:28:54.558818 waagent[1498]: 2024-04-12T18:28:54.558730Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Apr 12 18:28:54.560913 waagent[1498]: 2024-04-12T18:28:54.560824Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:28:54.561181 waagent[1498]: 2024-04-12T18:28:54.561107Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:54.561485 waagent[1498]: 2024-04-12T18:28:54.561416Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:54.562594 waagent[1498]: 2024-04-12T18:28:54.562473Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:28:54.562954 waagent[1498]: 2024-04-12T18:28:54.562887Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:28:54.562954 waagent[1498]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:28:54.562954 waagent[1498]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:28:54.562954 waagent[1498]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:28:54.562954 waagent[1498]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:54.562954 waagent[1498]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:54.562954 waagent[1498]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:28:54.565789 waagent[1498]: 2024-04-12T18:28:54.565654Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:28:54.566306 waagent[1498]: 2024-04-12T18:28:54.566225Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:28:54.567081 waagent[1498]: 2024-04-12T18:28:54.567000Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:28:54.569977 waagent[1498]: 2024-04-12T18:28:54.569823Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:28:54.570235 waagent[1498]: 2024-04-12T18:28:54.570173Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:28:54.570352 waagent[1498]: 2024-04-12T18:28:54.570306Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:28:54.573742 waagent[1498]: 2024-04-12T18:28:54.573462Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:28:54.573892 waagent[1498]: 2024-04-12T18:28:54.571913Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:28:54.575950 waagent[1498]: 2024-04-12T18:28:54.575853Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:28:54.576309 waagent[1498]: 2024-04-12T18:28:54.576238Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:28:54.579335 waagent[1498]: 2024-04-12T18:28:54.579173Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:28:54.581326 waagent[1498]: 2024-04-12T18:28:54.581233Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:28:54.581326 waagent[1498]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:28:54.581326 waagent[1498]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:28:54.581326 waagent[1498]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:06:30 brd ff:ff:ff:ff:ff:ff Apr 12 18:28:54.581326 waagent[1498]: 3: enP45804s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:06:30 brd ff:ff:ff:ff:ff:ff\ altname enP45804p0s2 Apr 12 18:28:54.581326 waagent[1498]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:28:54.581326 waagent[1498]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:28:54.581326 waagent[1498]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:28:54.581326 waagent[1498]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:28:54.581326 waagent[1498]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:28:54.581326 waagent[1498]: 2: eth0 inet6 fe80::20d:3aff:fe06:630/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:28:54.596599 waagent[1498]: 2024-04-12T18:28:54.596435Z INFO ExtHandler ExtHandler Downloading agent manifest Apr 12 18:28:54.611418 waagent[1498]: 2024-04-12T18:28:54.611316Z INFO ExtHandler ExtHandler Apr 12 18:28:54.612127 waagent[1498]: 2024-04-12T18:28:54.612059Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 15b6ddd8-ad5b-42ed-8fa9-8e90eb572b5d correlation ace39fa9-4d8a-4ebd-b5bc-ca1ca674b656 created: 2024-04-12T18:26:59.596352Z] Apr 12 18:28:54.613472 waagent[1498]: 2024-04-12T18:28:54.613390Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Apr 12 18:28:54.615495 waagent[1498]: 2024-04-12T18:28:54.615422Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Apr 12 18:28:54.636520 waagent[1498]: 2024-04-12T18:28:54.636441Z INFO ExtHandler ExtHandler Looking for existing remote access users. Apr 12 18:28:54.700365 waagent[1498]: 2024-04-12T18:28:54.700266Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.8 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 6CCE5F29-1B73-47ED-86F2-8EE9F8A4E199;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Apr 12 18:28:55.540245 waagent[1498]: 2024-04-12T18:28:55.540078Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Apr 12 18:28:55.540245 waagent[1498]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.540245 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.540245 waagent[1498]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.540245 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.540245 waagent[1498]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.540245 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.540245 waagent[1498]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:28:55.540245 waagent[1498]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:28:55.540245 waagent[1498]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:28:55.549169 waagent[1498]: 2024-04-12T18:28:55.549006Z INFO EnvHandler ExtHandler Current Firewall rules: Apr 12 18:28:55.549169 waagent[1498]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.549169 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.549169 waagent[1498]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.549169 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.549169 waagent[1498]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:28:55.549169 waagent[1498]: pkts bytes target prot opt in out source destination Apr 12 18:28:55.549169 waagent[1498]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:28:55.549169 waagent[1498]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:28:55.549169 waagent[1498]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:28:55.549772 waagent[1498]: 2024-04-12T18:28:55.549715Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Apr 12 18:29:13.719456 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Apr 12 18:29:23.789531 update_engine[1303]: I0412 18:29:23.789252 1303 update_attempter.cc:509] Updating boot flags... Apr 12 18:29:42.057343 systemd[1]: Created slice system-sshd.slice. Apr 12 18:29:42.058684 systemd[1]: Started sshd@0-10.200.20.38:22-10.200.12.6:32784.service. Apr 12 18:29:42.730480 sshd[1615]: Accepted publickey for core from 10.200.12.6 port 32784 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:42.753212 sshd[1615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:42.757566 systemd-logind[1300]: New session 3 of user core. Apr 12 18:29:42.758411 systemd[1]: Started session-3.scope. Apr 12 18:29:43.120903 systemd[1]: Started sshd@1-10.200.20.38:22-10.200.12.6:32798.service. Apr 12 18:29:43.527464 sshd[1620]: Accepted publickey for core from 10.200.12.6 port 32798 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:43.528880 sshd[1620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:43.532557 systemd-logind[1300]: New session 4 of user core. Apr 12 18:29:43.533446 systemd[1]: Started session-4.scope. Apr 12 18:29:43.823743 sshd[1620]: pam_unix(sshd:session): session closed for user core Apr 12 18:29:43.826615 systemd[1]: sshd@1-10.200.20.38:22-10.200.12.6:32798.service: Deactivated successfully. Apr 12 18:29:43.827392 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:29:43.827976 systemd-logind[1300]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:29:43.828713 systemd-logind[1300]: Removed session 4. Apr 12 18:29:43.896243 systemd[1]: Started sshd@2-10.200.20.38:22-10.200.12.6:32810.service. Apr 12 18:29:44.331654 sshd[1626]: Accepted publickey for core from 10.200.12.6 port 32810 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:44.333089 sshd[1626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:44.337690 systemd[1]: Started session-5.scope. Apr 12 18:29:44.338010 systemd-logind[1300]: New session 5 of user core. Apr 12 18:29:44.657323 sshd[1626]: pam_unix(sshd:session): session closed for user core Apr 12 18:29:44.660081 systemd[1]: sshd@2-10.200.20.38:22-10.200.12.6:32810.service: Deactivated successfully. Apr 12 18:29:44.660844 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:29:44.661403 systemd-logind[1300]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:29:44.662232 systemd-logind[1300]: Removed session 5. Apr 12 18:29:44.730763 systemd[1]: Started sshd@3-10.200.20.38:22-10.200.12.6:32822.service. Apr 12 18:29:45.165584 sshd[1632]: Accepted publickey for core from 10.200.12.6 port 32822 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:45.167314 sshd[1632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:45.171718 systemd[1]: Started session-6.scope. Apr 12 18:29:45.172324 systemd-logind[1300]: New session 6 of user core. Apr 12 18:29:45.495541 sshd[1632]: pam_unix(sshd:session): session closed for user core Apr 12 18:29:45.498460 systemd-logind[1300]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:29:45.498466 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:29:45.499055 systemd[1]: sshd@3-10.200.20.38:22-10.200.12.6:32822.service: Deactivated successfully. Apr 12 18:29:45.500080 systemd-logind[1300]: Removed session 6. Apr 12 18:29:45.576842 systemd[1]: Started sshd@4-10.200.20.38:22-10.200.12.6:52124.service. Apr 12 18:29:45.981284 sshd[1638]: Accepted publickey for core from 10.200.12.6 port 52124 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:45.982666 sshd[1638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:45.987052 systemd[1]: Started session-7.scope. Apr 12 18:29:45.987370 systemd-logind[1300]: New session 7 of user core. Apr 12 18:29:46.625670 sudo[1641]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:29:46.625883 sudo[1641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:29:46.680666 dbus-daemon[1285]: avc: received setenforce notice (enforcing=1) Apr 12 18:29:46.681665 sudo[1641]: pam_unix(sudo:session): session closed for user root Apr 12 18:29:46.772684 sshd[1638]: pam_unix(sshd:session): session closed for user core Apr 12 18:29:46.775875 systemd[1]: sshd@4-10.200.20.38:22-10.200.12.6:52124.service: Deactivated successfully. Apr 12 18:29:46.776785 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:29:46.777414 systemd-logind[1300]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:29:46.778368 systemd-logind[1300]: Removed session 7. Apr 12 18:29:46.845564 systemd[1]: Started sshd@5-10.200.20.38:22-10.200.12.6:52134.service. Apr 12 18:29:47.281005 sshd[1645]: Accepted publickey for core from 10.200.12.6 port 52134 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:47.283429 sshd[1645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:47.287376 systemd-logind[1300]: New session 8 of user core. Apr 12 18:29:47.287902 systemd[1]: Started session-8.scope. Apr 12 18:29:47.527920 sudo[1649]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:29:47.528135 sudo[1649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:29:47.531020 sudo[1649]: pam_unix(sudo:session): session closed for user root Apr 12 18:29:47.536215 sudo[1648]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:29:47.536748 sudo[1648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:29:47.545744 systemd[1]: Stopping audit-rules.service... Apr 12 18:29:47.551534 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 18:29:47.551665 kernel: audit: type=1305 audit(1712946587.546:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:29:47.546000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:29:47.552165 auditctl[1652]: No rules Apr 12 18:29:47.552689 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:29:47.552870 systemd[1]: Stopped audit-rules.service. Apr 12 18:29:47.562196 systemd[1]: Starting audit-rules.service... Apr 12 18:29:47.546000 audit[1652]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc334a8c0 a2=420 a3=0 items=0 ppid=1 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:47.587930 kernel: audit: type=1300 audit(1712946587.546:179): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc334a8c0 a2=420 a3=0 items=0 ppid=1 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:47.546000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:29:47.595444 kernel: audit: type=1327 audit(1712946587.546:179): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:29:47.595651 kernel: audit: type=1131 audit(1712946587.550:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.618648 augenrules[1669]: No rules Apr 12 18:29:47.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.619562 systemd[1]: Finished audit-rules.service. Apr 12 18:29:47.635000 audit[1648]: USER_END pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.636338 sudo[1648]: pam_unix(sudo:session): session closed for user root Apr 12 18:29:47.657093 kernel: audit: type=1130 audit(1712946587.619:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.657228 kernel: audit: type=1106 audit(1712946587.635:182): pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.657261 kernel: audit: type=1104 audit(1712946587.635:183): pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.635000 audit[1648]: CRED_DISP pid=1648 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.720000 sshd[1645]: pam_unix(sshd:session): session closed for user core Apr 12 18:29:47.720000 audit[1645]: USER_END pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:47.743780 systemd[1]: sshd@5-10.200.20.38:22-10.200.12.6:52134.service: Deactivated successfully. Apr 12 18:29:47.720000 audit[1645]: CRED_DISP pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:47.762301 kernel: audit: type=1106 audit(1712946587.720:184): pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:47.762397 kernel: audit: type=1104 audit(1712946587.720:185): pid=1645 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:47.744526 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:29:47.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.780080 kernel: audit: type=1131 audit(1712946587.743:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:47.780242 systemd-logind[1300]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:29:47.781352 systemd-logind[1300]: Removed session 8. Apr 12 18:29:47.790586 systemd[1]: Started sshd@6-10.200.20.38:22-10.200.12.6:52150.service. Apr 12 18:29:47.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:52150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:48.194000 audit[1675]: USER_ACCT pid=1675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:48.196416 sshd[1675]: Accepted publickey for core from 10.200.12.6 port 52150 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:29:48.196000 audit[1675]: CRED_ACQ pid=1675 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:48.196000 audit[1675]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6c61f20 a2=3 a3=1 items=0 ppid=1 pid=1675 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:48.196000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:29:48.198155 sshd[1675]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:29:48.202565 systemd[1]: Started session-9.scope. Apr 12 18:29:48.203731 systemd-logind[1300]: New session 9 of user core. Apr 12 18:29:48.206000 audit[1675]: USER_START pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:48.207000 audit[1677]: CRED_ACQ pid=1677 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:29:48.428000 audit[1678]: USER_ACCT pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:48.428000 audit[1678]: CRED_REFR pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:48.429645 sudo[1678]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:29:48.429864 sudo[1678]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:29:48.429000 audit[1678]: USER_START pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:29:49.150526 systemd[1]: Starting docker.service... Apr 12 18:29:49.203152 env[1693]: time="2024-04-12T18:29:49.203091222Z" level=info msg="Starting up" Apr 12 18:29:49.211769 env[1693]: time="2024-04-12T18:29:49.211737722Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:29:49.211897 env[1693]: time="2024-04-12T18:29:49.211883174Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:29:49.211971 env[1693]: time="2024-04-12T18:29:49.211954480Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:29:49.212024 env[1693]: time="2024-04-12T18:29:49.212012268Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:29:49.213965 env[1693]: time="2024-04-12T18:29:49.213925852Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:29:49.213965 env[1693]: time="2024-04-12T18:29:49.213955086Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:29:49.214124 env[1693]: time="2024-04-12T18:29:49.213976602Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:29:49.214124 env[1693]: time="2024-04-12T18:29:49.213991799Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:29:49.309897 env[1693]: time="2024-04-12T18:29:49.309859476Z" level=info msg="Loading containers: start." Apr 12 18:29:49.469000 audit[1721]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.469000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe3bfb2b0 a2=0 a3=1 items=0 ppid=1693 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.469000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:29:49.471000 audit[1723]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.471000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff2a07e50 a2=0 a3=1 items=0 ppid=1693 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:29:49.473000 audit[1725]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.473000 audit[1725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd6f43270 a2=0 a3=1 items=0 ppid=1693 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.473000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:29:49.474000 audit[1727]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.474000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffd0d36d0 a2=0 a3=1 items=0 ppid=1693 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:29:49.476000 audit[1729]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.476000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe386f950 a2=0 a3=1 items=0 ppid=1693 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:29:49.478000 audit[1731]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.478000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe3a21c10 a2=0 a3=1 items=0 ppid=1693 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.478000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:29:49.499000 audit[1733]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.499000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc6e737b0 a2=0 a3=1 items=0 ppid=1693 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.499000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:29:49.501000 audit[1735]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.501000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffde5023d0 a2=0 a3=1 items=0 ppid=1693 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.501000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:29:49.502000 audit[1737]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.502000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffd8e889e0 a2=0 a3=1 items=0 ppid=1693 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:29:49.518000 audit[1741]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.518000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc2275220 a2=0 a3=1 items=0 ppid=1693 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.518000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:29:49.520000 audit[1742]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.520000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff5686870 a2=0 a3=1 items=0 ppid=1693 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:29:49.551536 kernel: Initializing XFRM netlink socket Apr 12 18:29:49.611037 env[1693]: time="2024-04-12T18:29:49.611001687Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:29:49.721000 audit[1750]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.721000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffcbd88f10 a2=0 a3=1 items=0 ppid=1693 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.721000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:29:49.757000 audit[1753]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.757000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcb2b0fa0 a2=0 a3=1 items=0 ppid=1693 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:29:49.761000 audit[1756]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.761000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc883d7d0 a2=0 a3=1 items=0 ppid=1693 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:29:49.762000 audit[1758]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.762000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcd555ff0 a2=0 a3=1 items=0 ppid=1693 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:29:49.764000 audit[1760]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.764000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc5f09320 a2=0 a3=1 items=0 ppid=1693 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:29:49.766000 audit[1762]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.766000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc52ceec0 a2=0 a3=1 items=0 ppid=1693 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:29:49.768000 audit[1764]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.768000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffef3a4250 a2=0 a3=1 items=0 ppid=1693 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:29:49.770000 audit[1766]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.770000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc2da2f50 a2=0 a3=1 items=0 ppid=1693 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:29:49.771000 audit[1768]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.771000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffce435a10 a2=0 a3=1 items=0 ppid=1693 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:29:49.773000 audit[1770]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.773000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffcda708b0 a2=0 a3=1 items=0 ppid=1693 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:29:49.775000 audit[1772]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.775000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffddbc8550 a2=0 a3=1 items=0 ppid=1693 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.775000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:29:49.776965 systemd-networkd[1458]: docker0: Link UP Apr 12 18:29:49.793000 audit[1776]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.793000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec2f98e0 a2=0 a3=1 items=0 ppid=1693 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:29:49.794000 audit[1777]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:29:49.794000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd43ee10 a2=0 a3=1 items=0 ppid=1693 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:29:49.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:29:49.796920 env[1693]: time="2024-04-12T18:29:49.796892150Z" level=info msg="Loading containers: done." Apr 12 18:29:49.806312 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2232041014-merged.mount: Deactivated successfully. Apr 12 18:29:49.836961 env[1693]: time="2024-04-12T18:29:49.836918123Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:29:49.837314 env[1693]: time="2024-04-12T18:29:49.837295689Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:29:49.837487 env[1693]: time="2024-04-12T18:29:49.837472574Z" level=info msg="Daemon has completed initialization" Apr 12 18:29:49.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:49.868943 systemd[1]: Started docker.service. Apr 12 18:29:49.877352 env[1693]: time="2024-04-12T18:29:49.877281229Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:29:49.894225 systemd[1]: Reloading. Apr 12 18:29:49.965741 /usr/lib/systemd/system-generators/torcx-generator[1824]: time="2024-04-12T18:29:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:29:49.966082 /usr/lib/systemd/system-generators/torcx-generator[1824]: time="2024-04-12T18:29:49Z" level=info msg="torcx already run" Apr 12 18:29:50.041745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:29:50.041767 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:29:50.059029 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit: BPF prog-id=38 op=LOAD Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.123000 audit: BPF prog-id=39 op=LOAD Apr 12 18:29:50.123000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:29:50.123000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit: BPF prog-id=40 op=LOAD Apr 12 18:29:50.126000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit: BPF prog-id=41 op=LOAD Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.126000 audit: BPF prog-id=42 op=LOAD Apr 12 18:29:50.126000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:29:50.126000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit: BPF prog-id=43 op=LOAD Apr 12 18:29:50.127000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit: BPF prog-id=44 op=LOAD Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.127000 audit: BPF prog-id=45 op=LOAD Apr 12 18:29:50.127000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:29:50.127000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit: BPF prog-id=46 op=LOAD Apr 12 18:29:50.128000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.128000 audit: BPF prog-id=47 op=LOAD Apr 12 18:29:50.128000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit: BPF prog-id=48 op=LOAD Apr 12 18:29:50.129000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit: BPF prog-id=49 op=LOAD Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit: BPF prog-id=50 op=LOAD Apr 12 18:29:50.129000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:29:50.129000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.130000 audit: BPF prog-id=51 op=LOAD Apr 12 18:29:50.130000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:29:50.131000 audit: BPF prog-id=52 op=LOAD Apr 12 18:29:50.131000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:29:50.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:29:50.140043 systemd[1]: Started kubelet.service. Apr 12 18:29:50.194917 kubelet[1882]: E0412 18:29:50.194847 1882 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:29:50.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:29:50.198621 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:29:50.198760 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:29:54.663810 env[1313]: time="2024-04-12T18:29:54.663610233Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 18:29:55.569842 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4101607864.mount: Deactivated successfully. Apr 12 18:29:57.169899 env[1313]: time="2024-04-12T18:29:57.169838796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:57.178487 env[1313]: time="2024-04-12T18:29:57.178441901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:57.185000 env[1313]: time="2024-04-12T18:29:57.184960779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:57.192593 env[1313]: time="2024-04-12T18:29:57.192557845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:57.193380 env[1313]: time="2024-04-12T18:29:57.193344519Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de\"" Apr 12 18:29:57.203805 env[1313]: time="2024-04-12T18:29:57.203756735Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 18:29:59.028544 env[1313]: time="2024-04-12T18:29:59.028480640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:59.038035 env[1313]: time="2024-04-12T18:29:59.037522506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:59.040912 env[1313]: time="2024-04-12T18:29:59.040874636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:59.045556 env[1313]: time="2024-04-12T18:29:59.045484095Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:29:59.046382 env[1313]: time="2024-04-12T18:29:59.046352803Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8\"" Apr 12 18:29:59.056945 env[1313]: time="2024-04-12T18:29:59.056901399Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 18:30:00.313603 env[1313]: time="2024-04-12T18:30:00.313542548Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:00.323367 env[1313]: time="2024-04-12T18:30:00.323310019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:00.329159 env[1313]: time="2024-04-12T18:30:00.329112319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:00.333999 env[1313]: time="2024-04-12T18:30:00.333958440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:00.334608 env[1313]: time="2024-04-12T18:30:00.334574669Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687\"" Apr 12 18:30:00.344350 env[1313]: time="2024-04-12T18:30:00.344311265Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:30:00.400432 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:30:00.400647 systemd[1]: Stopped kubelet.service. Apr 12 18:30:00.417002 kernel: kauditd_printk_skb: 258 callbacks suppressed Apr 12 18:30:00.417168 kernel: audit: type=1130 audit(1712946600.399:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.402256 systemd[1]: Started kubelet.service. Apr 12 18:30:00.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.437010 kernel: audit: type=1131 audit(1712946600.399:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.437147 kernel: audit: type=1130 audit(1712946600.400:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:00.468310 kubelet[1916]: E0412 18:30:00.468261 1916 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:30:00.471327 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:30:00.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:30:00.471457 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:30:00.489532 kernel: audit: type=1131 audit(1712946600.470:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:30:01.572419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1112339554.mount: Deactivated successfully. Apr 12 18:30:02.297094 env[1313]: time="2024-04-12T18:30:02.297043475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.303257 env[1313]: time="2024-04-12T18:30:02.303197126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.307947 env[1313]: time="2024-04-12T18:30:02.307905141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.312759 env[1313]: time="2024-04-12T18:30:02.312721901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.313135 env[1313]: time="2024-04-12T18:30:02.313104127Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 18:30:02.322708 env[1313]: time="2024-04-12T18:30:02.322663497Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:30:02.921049 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1614031464.mount: Deactivated successfully. Apr 12 18:30:02.949608 env[1313]: time="2024-04-12T18:30:02.949559532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.960465 env[1313]: time="2024-04-12T18:30:02.960418198Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.967636 env[1313]: time="2024-04-12T18:30:02.967596505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.974111 env[1313]: time="2024-04-12T18:30:02.974072270Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:02.974495 env[1313]: time="2024-04-12T18:30:02.974464375Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:30:02.984638 env[1313]: time="2024-04-12T18:30:02.984599104Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 18:30:03.705435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount991988200.mount: Deactivated successfully. Apr 12 18:30:07.116956 env[1313]: time="2024-04-12T18:30:07.116894830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:07.125163 env[1313]: time="2024-04-12T18:30:07.125115240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:07.130537 env[1313]: time="2024-04-12T18:30:07.130484087Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:07.137302 env[1313]: time="2024-04-12T18:30:07.137250719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:07.138117 env[1313]: time="2024-04-12T18:30:07.138088254Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Apr 12 18:30:07.147605 env[1313]: time="2024-04-12T18:30:07.147564346Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:30:07.902309 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4242736601.mount: Deactivated successfully. Apr 12 18:30:08.315764 env[1313]: time="2024-04-12T18:30:08.315625677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:08.323428 env[1313]: time="2024-04-12T18:30:08.323386287Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:08.328724 env[1313]: time="2024-04-12T18:30:08.328663121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:08.334054 env[1313]: time="2024-04-12T18:30:08.334010946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:08.334580 env[1313]: time="2024-04-12T18:30:08.334546881Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 18:30:10.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.650437 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:30:10.650635 systemd[1]: Stopped kubelet.service. Apr 12 18:30:10.652163 systemd[1]: Started kubelet.service. Apr 12 18:30:10.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.685755 kernel: audit: type=1130 audit(1712946610.650:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.685873 kernel: audit: type=1131 audit(1712946610.650:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.685906 kernel: audit: type=1130 audit(1712946610.650:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:10.753660 kubelet[1995]: E0412 18:30:10.753614 1995 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:30:10.755760 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:30:10.755894 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:30:10.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:30:10.774526 kernel: audit: type=1131 audit(1712946610.755:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:30:13.950666 systemd[1]: Stopped kubelet.service. Apr 12 18:30:13.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:13.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:13.969610 kernel: audit: type=1130 audit(1712946613.950:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:13.987533 kernel: audit: type=1131 audit(1712946613.950:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:13.997901 systemd[1]: Reloading. Apr 12 18:30:14.050913 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-04-12T18:30:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:30:14.051269 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-04-12T18:30:14Z" level=info msg="torcx already run" Apr 12 18:30:14.129553 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:30:14.129790 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:30:14.147495 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.249000 kernel: audit: type=1400 audit(1712946614.214:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.249076 kernel: audit: type=1400 audit(1712946614.214:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.249158 kernel: audit: type=1400 audit(1712946614.214:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283244 kernel: audit: type=1400 audit(1712946614.214:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit: BPF prog-id=53 op=LOAD Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit: BPF prog-id=54 op=LOAD Apr 12 18:30:14.248000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:30:14.248000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit: BPF prog-id=55 op=LOAD Apr 12 18:30:14.266000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit: BPF prog-id=56 op=LOAD Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.283000 audit: BPF prog-id=57 op=LOAD Apr 12 18:30:14.283000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:30:14.283000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.285000 audit: BPF prog-id=58 op=LOAD Apr 12 18:30:14.285000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit: BPF prog-id=59 op=LOAD Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.286000 audit: BPF prog-id=60 op=LOAD Apr 12 18:30:14.287000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:30:14.287000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit: BPF prog-id=61 op=LOAD Apr 12 18:30:14.288000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit: BPF prog-id=62 op=LOAD Apr 12 18:30:14.289000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit: BPF prog-id=63 op=LOAD Apr 12 18:30:14.290000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.290000 audit: BPF prog-id=64 op=LOAD Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit: BPF prog-id=65 op=LOAD Apr 12 18:30:14.291000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:30:14.291000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.292000 audit: BPF prog-id=66 op=LOAD Apr 12 18:30:14.292000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:14.294000 audit: BPF prog-id=67 op=LOAD Apr 12 18:30:14.294000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:30:14.319783 systemd[1]: Started kubelet.service. Apr 12 18:30:14.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:14.375444 kubelet[2086]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:30:14.375444 kubelet[2086]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:30:14.375444 kubelet[2086]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:30:14.375830 kubelet[2086]: I0412 18:30:14.375511 2086 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:30:14.996900 kubelet[2086]: I0412 18:30:14.996863 2086 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:30:14.997082 kubelet[2086]: I0412 18:30:14.997071 2086 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:30:14.997370 kubelet[2086]: I0412 18:30:14.997356 2086 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:30:15.002890 kubelet[2086]: E0412 18:30:15.002860 2086 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.38:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.003109 kubelet[2086]: I0412 18:30:15.003096 2086 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:30:15.007562 kubelet[2086]: W0412 18:30:15.007536 2086 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:30:15.008095 kubelet[2086]: I0412 18:30:15.008062 2086 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:30:15.008306 kubelet[2086]: I0412 18:30:15.008292 2086 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:30:15.008475 kubelet[2086]: I0412 18:30:15.008457 2086 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:30:15.008597 kubelet[2086]: I0412 18:30:15.008479 2086 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:30:15.008597 kubelet[2086]: I0412 18:30:15.008487 2086 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:30:15.008683 kubelet[2086]: I0412 18:30:15.008634 2086 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:30:15.008776 kubelet[2086]: I0412 18:30:15.008757 2086 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:30:15.008804 kubelet[2086]: I0412 18:30:15.008778 2086 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:30:15.009272 kubelet[2086]: W0412 18:30:15.009223 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-2842bd657c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.009307 kubelet[2086]: E0412 18:30:15.009287 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-2842bd657c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.009332 kubelet[2086]: I0412 18:30:15.009317 2086 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:30:15.009354 kubelet[2086]: I0412 18:30:15.009334 2086 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:30:15.012226 kubelet[2086]: W0412 18:30:15.012170 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.012392 kubelet[2086]: E0412 18:30:15.012380 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.012574 kubelet[2086]: I0412 18:30:15.012560 2086 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:30:15.012925 kubelet[2086]: W0412 18:30:15.012907 2086 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:30:15.013462 kubelet[2086]: I0412 18:30:15.013439 2086 server.go:1232] "Started kubelet" Apr 12 18:30:15.013981 kubelet[2086]: I0412 18:30:15.013967 2086 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:30:15.014709 kubelet[2086]: I0412 18:30:15.014684 2086 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:30:15.013000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:15.013000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:15.013000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bf1710 a1=4000c033c8 a2=4000bf16e0 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.013000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:15.013000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:15.013000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:15.013000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c24300 a1=4000c033e0 a2=4000bf17a0 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.013000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:15.015228 kubelet[2086]: I0412 18:30:15.014940 2086 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:30:15.015228 kubelet[2086]: I0412 18:30:15.014982 2086 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:30:15.015228 kubelet[2086]: I0412 18:30:15.015045 2086 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:30:15.017190 kubelet[2086]: I0412 18:30:15.017154 2086 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:30:15.017539 kubelet[2086]: I0412 18:30:15.017494 2086 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:30:15.019041 kubelet[2086]: I0412 18:30:15.019010 2086 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:30:15.020245 kubelet[2086]: I0412 18:30:15.020214 2086 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:30:15.020398 kubelet[2086]: I0412 18:30:15.020376 2086 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:30:15.021896 kubelet[2086]: E0412 18:30:15.021773 2086 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-2842bd657c.17c59bdeeb151ce0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-2842bd657c", UID:"ci-3510.3.3-a-2842bd657c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-2842bd657c"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 30, 15, 13416160, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 30, 15, 13416160, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-2842bd657c"}': 'Post "https://10.200.20.38:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.38:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:30:15.022784 kubelet[2086]: W0412 18:30:15.022720 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.022784 kubelet[2086]: E0412 18:30:15.022786 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.022880 kubelet[2086]: E0412 18:30:15.022871 2086 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="200ms" Apr 12 18:30:15.022000 audit[2096]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.022000 audit[2096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd1749db0 a2=0 a3=1 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:30:15.024000 audit[2097]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.024000 audit[2097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe51e3f20 a2=0 a3=1 items=0 ppid=2086 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:30:15.028000 audit[2099]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.028000 audit[2099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4cbf390 a2=0 a3=1 items=0 ppid=2086 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:30:15.030000 audit[2101]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.030000 audit[2101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff6db74c0 a2=0 a3=1 items=0 ppid=2086 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:30:15.050535 kubelet[2086]: E0412 18:30:15.050486 2086 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:30:15.050720 kubelet[2086]: E0412 18:30:15.050709 2086 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:30:15.090000 audit[2107]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.090000 audit[2107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff1a1da90 a2=0 a3=1 items=0 ppid=2086 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:30:15.092798 kubelet[2086]: I0412 18:30:15.092760 2086 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:30:15.092000 audit[2109]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:15.092000 audit[2109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffca84a900 a2=0 a3=1 items=0 ppid=2086 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:30:15.092000 audit[2110]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.092000 audit[2110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc37a8b80 a2=0 a3=1 items=0 ppid=2086 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:30:15.094381 kubelet[2086]: I0412 18:30:15.094354 2086 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:30:15.094635 kubelet[2086]: I0412 18:30:15.094487 2086 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:30:15.094763 kubelet[2086]: I0412 18:30:15.094749 2086 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:30:15.094889 kubelet[2086]: E0412 18:30:15.094879 2086 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:30:15.095702 kubelet[2086]: W0412 18:30:15.095656 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.095799 kubelet[2086]: E0412 18:30:15.095711 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:15.094000 audit[2113]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.094000 audit[2113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3393b00 a2=0 a3=1 items=0 ppid=2086 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:30:15.095000 audit[2114]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:15.095000 audit[2114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5da0300 a2=0 a3=1 items=0 ppid=2086 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:30:15.096000 audit[2115]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:15.096000 audit[2115]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7d9e9d0 a2=0 a3=1 items=0 ppid=2086 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:30:15.096000 audit[2116]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:15.096000 audit[2116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff15866c0 a2=0 a3=1 items=0 ppid=2086 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:30:15.098000 audit[2117]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:15.098000 audit[2117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff9515df0 a2=0 a3=1 items=0 ppid=2086 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:30:15.156304 kubelet[2086]: I0412 18:30:15.156276 2086 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.156975 kubelet[2086]: I0412 18:30:15.156950 2086 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:30:15.156975 kubelet[2086]: I0412 18:30:15.156969 2086 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:30:15.157104 kubelet[2086]: I0412 18:30:15.156991 2086 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:30:15.157457 kubelet[2086]: E0412 18:30:15.157441 2086 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.163544 kubelet[2086]: I0412 18:30:15.163496 2086 policy_none.go:49] "None policy: Start" Apr 12 18:30:15.164342 kubelet[2086]: I0412 18:30:15.164324 2086 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:30:15.164465 kubelet[2086]: I0412 18:30:15.164456 2086 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:30:15.172165 systemd[1]: Created slice kubepods.slice. Apr 12 18:30:15.177414 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:30:15.180933 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:30:15.191303 kubelet[2086]: I0412 18:30:15.191264 2086 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:30:15.189000 audit[2086]: AVC avc: denied { mac_admin } for pid=2086 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:15.189000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:15.189000 audit[2086]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c153e0 a1=4000f0e4e0 a2=4000c153b0 a3=25 items=0 ppid=1 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:15.189000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:15.191620 kubelet[2086]: I0412 18:30:15.191357 2086 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:30:15.191620 kubelet[2086]: I0412 18:30:15.191579 2086 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:30:15.192742 kubelet[2086]: E0412 18:30:15.192696 2086 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-2842bd657c\" not found" Apr 12 18:30:15.195032 kubelet[2086]: I0412 18:30:15.195001 2086 topology_manager.go:215] "Topology Admit Handler" podUID="7180fa0e291540bfae8ba9d20f4bdd76" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.196689 kubelet[2086]: I0412 18:30:15.196661 2086 topology_manager.go:215] "Topology Admit Handler" podUID="5fe636e190716fc671a564ef12fc3c4a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.198382 kubelet[2086]: I0412 18:30:15.198348 2086 topology_manager.go:215] "Topology Admit Handler" podUID="dbb290407cabee224531aa27c982696b" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.203830 systemd[1]: Created slice kubepods-burstable-pod7180fa0e291540bfae8ba9d20f4bdd76.slice. Apr 12 18:30:15.219581 systemd[1]: Created slice kubepods-burstable-pod5fe636e190716fc671a564ef12fc3c4a.slice. Apr 12 18:30:15.221633 kubelet[2086]: I0412 18:30:15.221246 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.221633 kubelet[2086]: I0412 18:30:15.221291 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.221633 kubelet[2086]: I0412 18:30:15.221312 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222478 kubelet[2086]: I0412 18:30:15.222111 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222478 kubelet[2086]: I0412 18:30:15.222154 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222478 kubelet[2086]: I0412 18:30:15.222192 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dbb290407cabee224531aa27c982696b-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-2842bd657c\" (UID: \"dbb290407cabee224531aa27c982696b\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222478 kubelet[2086]: I0412 18:30:15.222220 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222478 kubelet[2086]: I0412 18:30:15.222270 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.222684 kubelet[2086]: I0412 18:30:15.222293 2086 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.224437 systemd[1]: Created slice kubepods-burstable-poddbb290407cabee224531aa27c982696b.slice. Apr 12 18:30:15.225114 kubelet[2086]: E0412 18:30:15.225093 2086 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="400ms" Apr 12 18:30:15.359528 kubelet[2086]: I0412 18:30:15.359415 2086 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.360831 kubelet[2086]: E0412 18:30:15.360784 2086 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.518857 env[1313]: time="2024-04-12T18:30:15.518537129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-2842bd657c,Uid:7180fa0e291540bfae8ba9d20f4bdd76,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:15.524406 env[1313]: time="2024-04-12T18:30:15.524357680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-2842bd657c,Uid:5fe636e190716fc671a564ef12fc3c4a,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:15.528602 env[1313]: time="2024-04-12T18:30:15.528259832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-2842bd657c,Uid:dbb290407cabee224531aa27c982696b,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:15.625659 kubelet[2086]: E0412 18:30:15.625547 2086 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="800ms" Apr 12 18:30:15.683120 kubelet[2086]: E0412 18:30:15.683014 2086 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.3-a-2842bd657c.17c59bdeeb151ce0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.3-a-2842bd657c", UID:"ci-3510.3.3-a-2842bd657c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-2842bd657c"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 30, 15, 13416160, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 30, 15, 13416160, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-2842bd657c"}': 'Post "https://10.200.20.38:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.38:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:30:15.763208 kubelet[2086]: I0412 18:30:15.763163 2086 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:15.763538 kubelet[2086]: E0412 18:30:15.763516 2086 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:16.035090 kubelet[2086]: W0412 18:30:16.035021 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-2842bd657c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.035090 kubelet[2086]: E0412 18:30:16.035097 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-2842bd657c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.081720 kubelet[2086]: W0412 18:30:16.081597 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.081720 kubelet[2086]: E0412 18:30:16.081663 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.174886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2195830497.mount: Deactivated successfully. Apr 12 18:30:16.215354 env[1313]: time="2024-04-12T18:30:16.215302173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.226648 env[1313]: time="2024-04-12T18:30:16.226594617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.231879 env[1313]: time="2024-04-12T18:30:16.231828361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.238797 env[1313]: time="2024-04-12T18:30:16.238760132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.249442 env[1313]: time="2024-04-12T18:30:16.249400523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.254607 env[1313]: time="2024-04-12T18:30:16.254567474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.258251 env[1313]: time="2024-04-12T18:30:16.258209741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.269546 env[1313]: time="2024-04-12T18:30:16.269476788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.270918 env[1313]: time="2024-04-12T18:30:16.270883524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.276868 env[1313]: time="2024-04-12T18:30:16.276815397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.280166 env[1313]: time="2024-04-12T18:30:16.280127738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.286521 env[1313]: time="2024-04-12T18:30:16.286399056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:16.372926 kubelet[2086]: W0412 18:30:16.372861 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.372926 kubelet[2086]: E0412 18:30:16.372905 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.397714 env[1313]: time="2024-04-12T18:30:16.397633991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:16.397928 env[1313]: time="2024-04-12T18:30:16.397903163Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:16.398038 env[1313]: time="2024-04-12T18:30:16.398016592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:16.398313 env[1313]: time="2024-04-12T18:30:16.398283085Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe4f777b908c9d1202b5d3db8888df602ca00913d6c6aa06ab3fa8b910dbee3c pid=2134 runtime=io.containerd.runc.v2 Apr 12 18:30:16.403391 env[1313]: time="2024-04-12T18:30:16.403128069Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:16.403391 env[1313]: time="2024-04-12T18:30:16.403167025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:16.403391 env[1313]: time="2024-04-12T18:30:16.403177464Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:16.403726 env[1313]: time="2024-04-12T18:30:16.403651975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca pid=2135 runtime=io.containerd.runc.v2 Apr 12 18:30:16.411811 systemd[1]: Started cri-containerd-fe4f777b908c9d1202b5d3db8888df602ca00913d6c6aa06ab3fa8b910dbee3c.scope. Apr 12 18:30:16.424792 env[1313]: time="2024-04-12T18:30:16.423765036Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:16.424792 env[1313]: time="2024-04-12T18:30:16.423806592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:16.424792 env[1313]: time="2024-04-12T18:30:16.423816631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:16.424792 env[1313]: time="2024-04-12T18:30:16.423955417Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c pid=2187 runtime=io.containerd.runc.v2 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.431980 kernel: kauditd_printk_skb: 217 callbacks suppressed Apr 12 18:30:16.432131 kernel: audit: type=1400 audit(1712946616.425:593): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.449863 kubelet[2086]: E0412 18:30:16.449825 2086 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="1.6s" Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.466808 kernel: audit: type=1400 audit(1712946616.425:594): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.484705 kernel: audit: type=1400 audit(1712946616.425:595): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.502473 kernel: audit: type=1400 audit(1712946616.425:596): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.520283 kernel: audit: type=1400 audit(1712946616.425:597): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.537911 env[1313]: time="2024-04-12T18:30:16.537796765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-2842bd657c,Uid:7180fa0e291540bfae8ba9d20f4bdd76,Namespace:kube-system,Attempt:0,} returns sandbox id \"fe4f777b908c9d1202b5d3db8888df602ca00913d6c6aa06ab3fa8b910dbee3c\"" Apr 12 18:30:16.538241 kernel: audit: type=1400 audit(1712946616.425:598): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.539429 systemd[1]: Started cri-containerd-75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca.scope. Apr 12 18:30:16.540693 kubelet[2086]: W0412 18:30:16.539828 2086 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.540693 kubelet[2086]: E0412 18:30:16.539869 2086 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Apr 12 18:30:16.540454 systemd[1]: Started cri-containerd-d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c.scope. Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.550526 env[1313]: time="2024-04-12T18:30:16.550468748Z" level=info msg="CreateContainer within sandbox \"fe4f777b908c9d1202b5d3db8888df602ca00913d6c6aa06ab3fa8b910dbee3c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:30:16.558863 kernel: audit: type=1400 audit(1712946616.425:599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.577522 kernel: audit: type=1400 audit(1712946616.425:600): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.580242 kubelet[2086]: I0412 18:30:16.579888 2086 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:16.580242 kubelet[2086]: E0412 18:30:16.580219 2086 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:16.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613295 kernel: audit: type=1400 audit(1712946616.425:601): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613439 kernel: audit: type=1400 audit(1712946616.425:602): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.425000 audit: BPF prog-id=68 op=LOAD Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2134 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346637373762393038633964313230326235643364623838383864 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2134 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346637373762393038633964313230326235643364623838383864 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.438000 audit: BPF prog-id=69 op=LOAD Apr 12 18:30:16.438000 audit[2155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2134 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346637373762393038633964313230326235643364623838383864 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.455000 audit: BPF prog-id=70 op=LOAD Apr 12 18:30:16.455000 audit[2155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2134 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346637373762393038633964313230326235643364623838383864 Apr 12 18:30:16.472000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:30:16.472000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.472000 audit: BPF prog-id=71 op=LOAD Apr 12 18:30:16.472000 audit[2155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2134 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665346637373762393038633964313230326235643364623838383864 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit: BPF prog-id=72 op=LOAD Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2187 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613035313863646335353332613738623264303838623965626435 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2187 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613035313863646335353332613738623264303838623965626435 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit: BPF prog-id=73 op=LOAD Apr 12 18:30:16.613000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2187 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613035313863646335353332613738623264303838623965626435 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit: BPF prog-id=74 op=LOAD Apr 12 18:30:16.613000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2187 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613035313863646335353332613738623264303838623965626435 Apr 12 18:30:16.613000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:30:16.613000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.613000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.615000 audit: BPF prog-id=76 op=LOAD Apr 12 18:30:16.613000 audit[2196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2187 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436613035313863646335353332613738623264303838623965626435 Apr 12 18:30:16.615000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.615000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2135 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616534386631303363333466663038653964336536633566663036 Apr 12 18:30:16.615000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.615000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2135 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735616534386631303363333466663038653964336536633566663036 Apr 12 18:30:16.642604 env[1313]: time="2024-04-12T18:30:16.640296874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-2842bd657c,Uid:5fe636e190716fc671a564ef12fc3c4a,Namespace:kube-system,Attempt:0,} returns sandbox id \"d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c\"" Apr 12 18:30:16.644684 env[1313]: time="2024-04-12T18:30:16.644637230Z" level=info msg="CreateContainer within sandbox \"d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:30:16.649159 env[1313]: time="2024-04-12T18:30:16.649112612Z" level=info msg="CreateContainer within sandbox \"fe4f777b908c9d1202b5d3db8888df602ca00913d6c6aa06ab3fa8b910dbee3c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1eee430f6ec7ee9070905a6d85b54f2d2168d280056177036316986d8ed46eb9\"" Apr 12 18:30:16.650406 env[1313]: time="2024-04-12T18:30:16.650361004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-2842bd657c,Uid:dbb290407cabee224531aa27c982696b,Namespace:kube-system,Attempt:0,} returns sandbox id \"75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca\"" Apr 12 18:30:16.651200 env[1313]: time="2024-04-12T18:30:16.651171001Z" level=info msg="StartContainer for \"1eee430f6ec7ee9070905a6d85b54f2d2168d280056177036316986d8ed46eb9\"" Apr 12 18:30:16.653467 env[1313]: time="2024-04-12T18:30:16.653418931Z" level=info msg="CreateContainer within sandbox \"75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:30:16.672368 systemd[1]: Started cri-containerd-1eee430f6ec7ee9070905a6d85b54f2d2168d280056177036316986d8ed46eb9.scope. Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.686000 audit: BPF prog-id=80 op=LOAD Apr 12 18:30:16.687000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.687000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2134 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656534333066366563376565393037303930356136643835623534 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2134 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656534333066366563376565393037303930356136643835623534 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.688000 audit: BPF prog-id=81 op=LOAD Apr 12 18:30:16.688000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2134 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656534333066366563376565393037303930356136643835623534 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit: BPF prog-id=82 op=LOAD Apr 12 18:30:16.689000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2134 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656534333066366563376565393037303930356136643835623534 Apr 12 18:30:16.689000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:30:16.689000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.689000 audit: BPF prog-id=83 op=LOAD Apr 12 18:30:16.689000 audit[2256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2134 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165656534333066366563376565393037303930356136643835623534 Apr 12 18:30:16.706103 env[1313]: time="2024-04-12T18:30:16.706052304Z" level=info msg="CreateContainer within sandbox \"d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877\"" Apr 12 18:30:16.706777 env[1313]: time="2024-04-12T18:30:16.706752033Z" level=info msg="StartContainer for \"0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877\"" Apr 12 18:30:16.725399 env[1313]: time="2024-04-12T18:30:16.725347489Z" level=info msg="CreateContainer within sandbox \"75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6\"" Apr 12 18:30:16.726212 env[1313]: time="2024-04-12T18:30:16.726172685Z" level=info msg="StartContainer for \"d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6\"" Apr 12 18:30:16.727694 env[1313]: time="2024-04-12T18:30:16.727652813Z" level=info msg="StartContainer for \"1eee430f6ec7ee9070905a6d85b54f2d2168d280056177036316986d8ed46eb9\" returns successfully" Apr 12 18:30:16.741301 systemd[1]: Started cri-containerd-0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877.scope. Apr 12 18:30:16.760705 systemd[1]: Started cri-containerd-d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6.scope. Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.765000 audit: BPF prog-id=84 op=LOAD Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2187 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064373739313330633335303566323737663565353433366534623635 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2187 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064373739313330633335303566323737663565353433366534623635 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit: BPF prog-id=85 op=LOAD Apr 12 18:30:16.766000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2187 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064373739313330633335303566323737663565353433366534623635 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit: BPF prog-id=86 op=LOAD Apr 12 18:30:16.766000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2187 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064373739313330633335303566323737663565353433366534623635 Apr 12 18:30:16.766000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:30:16.766000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.766000 audit: BPF prog-id=87 op=LOAD Apr 12 18:30:16.766000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2187 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064373739313330633335303566323737663565353433366534623635 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.799000 audit: BPF prog-id=88 op=LOAD Apr 12 18:30:16.804000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.804000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.805980 env[1313]: time="2024-04-12T18:30:16.805938441Z" level=info msg="StartContainer for \"0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877\" returns successfully" Apr 12 18:30:16.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437666433656131316634336136363662333965616165323734346464 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437666433656131316634336136363662333965616165323734346464 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.805000 audit: BPF prog-id=89 op=LOAD Apr 12 18:30:16.805000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437666433656131316634336136363662333965616165323734346464 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit: BPF prog-id=90 op=LOAD Apr 12 18:30:16.806000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437666433656131316634336136363662333965616165323734346464 Apr 12 18:30:16.806000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:30:16.806000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:16.806000 audit: BPF prog-id=91 op=LOAD Apr 12 18:30:16.806000 audit[2307]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:16.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437666433656131316634336136363662333965616165323734346464 Apr 12 18:30:16.865837 env[1313]: time="2024-04-12T18:30:16.865759078Z" level=info msg="StartContainer for \"d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6\" returns successfully" Apr 12 18:30:18.182051 kubelet[2086]: I0412 18:30:18.182024 2086 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:19.460000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.460000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40028d3bc0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.460000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.460000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40028d3c80 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.467000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.467000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40033147b0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.468000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.468000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4004583100 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.473000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.473000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4004382d80 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.473000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.473000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4003315f50 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:30:19.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:30:19.898924 kubelet[2086]: I0412 18:30:19.898805 2086 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:19.926000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.926000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400048ecc0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:19.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:19.926000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:19.926000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400042c6e0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:19.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:19.986955 kubelet[2086]: E0412 18:30:19.986923 2086 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Apr 12 18:30:20.014579 kubelet[2086]: I0412 18:30:20.014525 2086 apiserver.go:52] "Watching apiserver" Apr 12 18:30:20.021038 kubelet[2086]: I0412 18:30:20.020995 2086 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:30:22.409892 systemd[1]: Reloading. Apr 12 18:30:22.487066 /usr/lib/systemd/system-generators/torcx-generator[2380]: time="2024-04-12T18:30:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:30:22.487472 /usr/lib/systemd/system-generators/torcx-generator[2380]: time="2024-04-12T18:30:22Z" level=info msg="torcx already run" Apr 12 18:30:22.576855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:30:22.577063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:30:22.596870 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:30:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684191 kernel: kauditd_printk_skb: 436 callbacks suppressed Apr 12 18:30:22.684298 kernel: audit: type=1400 audit(1712946622.678:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.717991 kernel: audit: type=1400 audit(1712946622.678:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.735899 kernel: audit: type=1400 audit(1712946622.679:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.741419 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:30:22.741544 kernel: audit: type=1400 audit(1712946622.679:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.764548 kernel: audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:30:22.764648 kernel: audit: type=1400 audit(1712946622.679:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.785228 kernel: audit: backlog limit exceeded Apr 12 18:30:22.785337 kernel: audit: type=1400 audit(1712946622.679:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.807159 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.683000 audit: BPF prog-id=92 op=LOAD Apr 12 18:30:22.683000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit: BPF prog-id=93 op=LOAD Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.700000 audit: BPF prog-id=94 op=LOAD Apr 12 18:30:22.700000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:30:22.700000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.717000 audit: BPF prog-id=95 op=LOAD Apr 12 18:30:22.717000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.718000 audit: BPF prog-id=96 op=LOAD Apr 12 18:30:22.718000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.785000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:30:22.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.806000 audit: BPF prog-id=98 op=LOAD Apr 12 18:30:22.806000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.808000 audit: BPF prog-id=99 op=LOAD Apr 12 18:30:22.808000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit: BPF prog-id=100 op=LOAD Apr 12 18:30:22.809000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit: BPF prog-id=101 op=LOAD Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.809000 audit: BPF prog-id=102 op=LOAD Apr 12 18:30:22.809000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:30:22.809000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit: BPF prog-id=103 op=LOAD Apr 12 18:30:22.810000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit: BPF prog-id=104 op=LOAD Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.810000 audit: BPF prog-id=105 op=LOAD Apr 12 18:30:22.810000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:30:22.810000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit: BPF prog-id=106 op=LOAD Apr 12 18:30:22.811000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit: BPF prog-id=107 op=LOAD Apr 12 18:30:22.812000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit: BPF prog-id=108 op=LOAD Apr 12 18:30:22.813000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit: BPF prog-id=109 op=LOAD Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit: BPF prog-id=110 op=LOAD Apr 12 18:30:22.813000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:30:22.813000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.813000 audit: BPF prog-id=111 op=LOAD Apr 12 18:30:22.813000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.815000 audit: BPF prog-id=112 op=LOAD Apr 12 18:30:22.815000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:30:22.829542 kubelet[2086]: I0412 18:30:22.828715 2086 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:30:22.829012 systemd[1]: Stopping kubelet.service... Apr 12 18:30:22.848850 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:30:22.849220 systemd[1]: Stopped kubelet.service. Apr 12 18:30:22.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:22.851832 systemd[1]: Started kubelet.service. Apr 12 18:30:22.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:22.924723 kubelet[2440]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:30:22.925074 kubelet[2440]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:30:22.925125 kubelet[2440]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:30:22.925262 kubelet[2440]: I0412 18:30:22.925230 2440 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:30:22.929649 kubelet[2440]: I0412 18:30:22.929616 2440 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:30:22.929649 kubelet[2440]: I0412 18:30:22.929644 2440 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:30:22.929897 kubelet[2440]: I0412 18:30:22.929878 2440 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:30:22.932668 kubelet[2440]: I0412 18:30:22.932634 2440 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:30:22.937940 kubelet[2440]: I0412 18:30:22.934249 2440 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:30:22.941962 kubelet[2440]: W0412 18:30:22.941938 2440 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:30:22.942729 kubelet[2440]: I0412 18:30:22.942710 2440 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:30:22.943048 kubelet[2440]: I0412 18:30:22.943035 2440 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:30:22.943305 kubelet[2440]: I0412 18:30:22.943286 2440 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:30:22.943431 kubelet[2440]: I0412 18:30:22.943420 2440 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:30:22.943484 kubelet[2440]: I0412 18:30:22.943476 2440 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:30:22.943585 kubelet[2440]: I0412 18:30:22.943575 2440 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:30:22.943748 kubelet[2440]: I0412 18:30:22.943737 2440 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:30:22.943830 kubelet[2440]: I0412 18:30:22.943821 2440 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:30:22.943903 kubelet[2440]: I0412 18:30:22.943894 2440 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:30:22.943960 kubelet[2440]: I0412 18:30:22.943951 2440 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:30:22.949103 kubelet[2440]: I0412 18:30:22.949082 2440 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:30:22.949763 kubelet[2440]: I0412 18:30:22.949745 2440 server.go:1232] "Started kubelet" Apr 12 18:30:22.950000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.950000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:22.950000 audit[2440]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c52db0 a1=4000c012a8 a2=4000c52d80 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:22.950000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:22.951838 kubelet[2440]: I0412 18:30:22.951820 2440 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:30:22.951000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:22.951000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:22.951000 audit[2440]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c15220 a1=4000c012c0 a2=4000c52e40 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:22.951000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:22.952100 kubelet[2440]: I0412 18:30:22.952084 2440 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:30:22.952171 kubelet[2440]: I0412 18:30:22.952162 2440 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:30:22.961973 kubelet[2440]: I0412 18:30:22.959564 2440 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:30:22.961973 kubelet[2440]: I0412 18:30:22.960230 2440 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:30:22.961973 kubelet[2440]: I0412 18:30:22.961196 2440 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:30:22.961973 kubelet[2440]: I0412 18:30:22.961356 2440 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:30:22.963750 kubelet[2440]: E0412 18:30:22.963491 2440 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:30:22.963750 kubelet[2440]: E0412 18:30:22.963545 2440 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:30:22.964329 kubelet[2440]: I0412 18:30:22.964078 2440 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:30:22.964329 kubelet[2440]: I0412 18:30:22.964201 2440 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:30:22.964428 kubelet[2440]: I0412 18:30:22.964389 2440 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:30:22.989751 kubelet[2440]: I0412 18:30:22.989707 2440 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:30:22.992808 kubelet[2440]: I0412 18:30:22.992780 2440 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:30:22.992965 kubelet[2440]: I0412 18:30:22.992954 2440 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:30:22.993033 kubelet[2440]: I0412 18:30:22.993024 2440 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:30:22.993161 kubelet[2440]: E0412 18:30:22.993151 2440 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.061961 2440 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.061989 2440 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.062010 2440 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.062177 2440 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.062197 2440 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:30:23.062539 kubelet[2440]: I0412 18:30:23.062205 2440 policy_none.go:49] "None policy: Start" Apr 12 18:30:23.063279 kubelet[2440]: I0412 18:30:23.063262 2440 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:30:23.063399 kubelet[2440]: I0412 18:30:23.063389 2440 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:30:23.063609 kubelet[2440]: I0412 18:30:23.063596 2440 state_mem.go:75] "Updated machine memory state" Apr 12 18:30:23.066855 kubelet[2440]: I0412 18:30:23.066835 2440 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.079121 kubelet[2440]: I0412 18:30:23.079075 2440 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:30:23.078000 audit[2440]: AVC avc: denied { mac_admin } for pid=2440 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:23.078000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:30:23.078000 audit[2440]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001122a50 a1=400111eaf8 a2=4001122a20 a3=25 items=0 ppid=1 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:23.078000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:30:23.079436 kubelet[2440]: I0412 18:30:23.079157 2440 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:30:23.079436 kubelet[2440]: I0412 18:30:23.079363 2440 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:30:23.097733 kubelet[2440]: I0412 18:30:23.097703 2440 topology_manager.go:215] "Topology Admit Handler" podUID="7180fa0e291540bfae8ba9d20f4bdd76" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.098001 kubelet[2440]: I0412 18:30:23.097986 2440 topology_manager.go:215] "Topology Admit Handler" podUID="5fe636e190716fc671a564ef12fc3c4a" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.098107 kubelet[2440]: I0412 18:30:23.098096 2440 topology_manager.go:215] "Topology Admit Handler" podUID="dbb290407cabee224531aa27c982696b" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.123871 kubelet[2440]: I0412 18:30:23.123841 2440 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.124083 kubelet[2440]: I0412 18:30:23.124073 2440 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.142165 kubelet[2440]: W0412 18:30:23.142123 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:30:23.149834 kubelet[2440]: W0412 18:30:23.149778 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:30:23.155672 kubelet[2440]: W0412 18:30:23.155629 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:30:23.265540 kubelet[2440]: I0412 18:30:23.265404 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265540 kubelet[2440]: I0412 18:30:23.265457 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265540 kubelet[2440]: I0412 18:30:23.265493 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265540 kubelet[2440]: I0412 18:30:23.265539 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7180fa0e291540bfae8ba9d20f4bdd76-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" (UID: \"7180fa0e291540bfae8ba9d20f4bdd76\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265747 kubelet[2440]: I0412 18:30:23.265571 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265747 kubelet[2440]: I0412 18:30:23.265606 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265747 kubelet[2440]: I0412 18:30:23.265626 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265747 kubelet[2440]: I0412 18:30:23.265646 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5fe636e190716fc671a564ef12fc3c4a-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-2842bd657c\" (UID: \"5fe636e190716fc671a564ef12fc3c4a\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.265747 kubelet[2440]: I0412 18:30:23.265679 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dbb290407cabee224531aa27c982696b-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-2842bd657c\" (UID: \"dbb290407cabee224531aa27c982696b\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:23.945215 kubelet[2440]: I0412 18:30:23.945176 2440 apiserver.go:52] "Watching apiserver" Apr 12 18:30:23.964854 kubelet[2440]: I0412 18:30:23.964805 2440 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:30:24.046407 kubelet[2440]: W0412 18:30:24.046360 2440 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:30:24.046556 kubelet[2440]: E0412 18:30:24.046457 2440 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.3-a-2842bd657c\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" Apr 12 18:30:24.077377 kubelet[2440]: I0412 18:30:24.077329 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-2842bd657c" podStartSLOduration=1.077279378 podCreationTimestamp="2024-04-12 18:30:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:30:24.072081349 +0000 UTC m=+1.211163790" watchObservedRunningTime="2024-04-12 18:30:24.077279378 +0000 UTC m=+1.216361819" Apr 12 18:30:24.106632 kubelet[2440]: I0412 18:30:24.106576 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-2842bd657c" podStartSLOduration=1.106536599 podCreationTimestamp="2024-04-12 18:30:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:30:24.096124262 +0000 UTC m=+1.235206703" watchObservedRunningTime="2024-04-12 18:30:24.106536599 +0000 UTC m=+1.245619120" Apr 12 18:30:24.407000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:24.407000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000cfdb20 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:24.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:24.407000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:24.407000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000cfdb60 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:24.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:24.408000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:24.408000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000dc59c0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:24.408000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:30:24.408000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000cfdea0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:24.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:24.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:24.962000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521031 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:30:24.962000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40006a4f40 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:30:24.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:30:27.468652 kubelet[2440]: I0412 18:30:27.468612 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-2842bd657c" podStartSLOduration=4.468572374 podCreationTimestamp="2024-04-12 18:30:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:30:24.106798136 +0000 UTC m=+1.245880617" watchObservedRunningTime="2024-04-12 18:30:27.468572374 +0000 UTC m=+4.607654815" Apr 12 18:30:28.550065 sudo[1678]: pam_unix(sudo:session): session closed for user root Apr 12 18:30:28.556603 kernel: kauditd_printk_skb: 267 callbacks suppressed Apr 12 18:30:28.556703 kernel: audit: type=1106 audit(1712946628.549:956): pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.549000 audit[1678]: USER_END pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.554000 audit[1678]: CRED_DISP pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.596777 kernel: audit: type=1104 audit(1712946628.554:957): pid=1678 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.623312 sshd[1675]: pam_unix(sshd:session): session closed for user core Apr 12 18:30:28.622000 audit[1675]: USER_END pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:30:28.622000 audit[1675]: CRED_DISP pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:30:28.651040 systemd[1]: sshd@6-10.200.20.38:22-10.200.12.6:52150.service: Deactivated successfully. Apr 12 18:30:28.651975 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:30:28.652177 systemd[1]: session-9.scope: Consumed 6.979s CPU time. Apr 12 18:30:28.672598 kernel: audit: type=1106 audit(1712946628.622:958): pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:30:28.672688 kernel: audit: type=1104 audit(1712946628.622:959): pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:30:28.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:52150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.673295 systemd-logind[1300]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:30:28.694530 kernel: audit: type=1131 audit(1712946628.649:960): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:52150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:28.694610 systemd-logind[1300]: Removed session 9. Apr 12 18:30:37.218407 kubelet[2440]: I0412 18:30:37.218375 2440 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:30:37.219204 env[1313]: time="2024-04-12T18:30:37.219166913Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:30:37.219740 kubelet[2440]: I0412 18:30:37.219712 2440 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:30:37.771436 kubelet[2440]: I0412 18:30:37.771392 2440 topology_manager.go:215] "Topology Admit Handler" podUID="9bbcbad9-6148-4a95-a5f9-6d1dc492e828" podNamespace="kube-system" podName="kube-proxy-z6fd4" Apr 12 18:30:37.777676 systemd[1]: Created slice kubepods-besteffort-pod9bbcbad9_6148_4a95_a5f9_6d1dc492e828.slice. Apr 12 18:30:37.780405 kubelet[2440]: W0412 18:30:37.780363 2440 reflector.go:535] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.3-a-2842bd657c" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-2842bd657c' and this object Apr 12 18:30:37.780715 kubelet[2440]: E0412 18:30:37.780698 2440 reflector.go:147] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.3-a-2842bd657c" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-2842bd657c' and this object Apr 12 18:30:37.780817 kubelet[2440]: W0412 18:30:37.780363 2440 reflector.go:535] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.3-a-2842bd657c" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-2842bd657c' and this object Apr 12 18:30:37.780920 kubelet[2440]: E0412 18:30:37.780907 2440 reflector.go:147] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.3-a-2842bd657c" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-2842bd657c' and this object Apr 12 18:30:37.851014 kubelet[2440]: I0412 18:30:37.850975 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-kube-proxy\") pod \"kube-proxy-z6fd4\" (UID: \"9bbcbad9-6148-4a95-a5f9-6d1dc492e828\") " pod="kube-system/kube-proxy-z6fd4" Apr 12 18:30:37.851014 kubelet[2440]: I0412 18:30:37.851019 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-xtables-lock\") pod \"kube-proxy-z6fd4\" (UID: \"9bbcbad9-6148-4a95-a5f9-6d1dc492e828\") " pod="kube-system/kube-proxy-z6fd4" Apr 12 18:30:37.851196 kubelet[2440]: I0412 18:30:37.851040 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-lib-modules\") pod \"kube-proxy-z6fd4\" (UID: \"9bbcbad9-6148-4a95-a5f9-6d1dc492e828\") " pod="kube-system/kube-proxy-z6fd4" Apr 12 18:30:37.851196 kubelet[2440]: I0412 18:30:37.851062 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-djlgj\" (UniqueName: \"kubernetes.io/projected/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-kube-api-access-djlgj\") pod \"kube-proxy-z6fd4\" (UID: \"9bbcbad9-6148-4a95-a5f9-6d1dc492e828\") " pod="kube-system/kube-proxy-z6fd4" Apr 12 18:30:38.147857 kubelet[2440]: I0412 18:30:38.147723 2440 topology_manager.go:215] "Topology Admit Handler" podUID="e4858b5c-abdd-473f-a425-98ecb65f45cc" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-nphz5" Apr 12 18:30:38.152926 systemd[1]: Created slice kubepods-besteffort-pode4858b5c_abdd_473f_a425_98ecb65f45cc.slice. Apr 12 18:30:38.252722 kubelet[2440]: I0412 18:30:38.252690 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e4858b5c-abdd-473f-a425-98ecb65f45cc-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-nphz5\" (UID: \"e4858b5c-abdd-473f-a425-98ecb65f45cc\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-nphz5" Apr 12 18:30:38.253067 kubelet[2440]: I0412 18:30:38.252760 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lcnz4\" (UniqueName: \"kubernetes.io/projected/e4858b5c-abdd-473f-a425-98ecb65f45cc-kube-api-access-lcnz4\") pod \"tigera-operator-6bfc79cb9c-nphz5\" (UID: \"e4858b5c-abdd-473f-a425-98ecb65f45cc\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-nphz5" Apr 12 18:30:38.457151 env[1313]: time="2024-04-12T18:30:38.457104182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-nphz5,Uid:e4858b5c-abdd-473f-a425-98ecb65f45cc,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:30:38.490820 env[1313]: time="2024-04-12T18:30:38.490739193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:38.490820 env[1313]: time="2024-04-12T18:30:38.490787870Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:38.491224 env[1313]: time="2024-04-12T18:30:38.490798709Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:38.491224 env[1313]: time="2024-04-12T18:30:38.491034533Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb pid=2522 runtime=io.containerd.runc.v2 Apr 12 18:30:38.512259 systemd[1]: Started cri-containerd-35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb.scope. Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.558275 kernel: audit: type=1400 audit(1712946638.522:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.558402 kernel: audit: type=1400 audit(1712946638.522:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.576758 kernel: audit: type=1400 audit(1712946638.522:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.595141 kernel: audit: type=1400 audit(1712946638.522:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.614206 kernel: audit: type=1400 audit(1712946638.522:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.636145 kernel: audit: type=1400 audit(1712946638.522:966): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.654147 kernel: audit: type=1400 audit(1712946638.522:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.671811 kernel: audit: type=1400 audit(1712946638.522:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.689088 kernel: audit: type=1400 audit(1712946638.522:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.706705 kernel: audit: type=1400 audit(1712946638.522:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit: BPF prog-id=113 op=LOAD Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:38.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643966626434343231376565626532643038636663303764363232 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:38.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643966626434343231376565626532643038636663303764363232 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.522000 audit: BPF prog-id=114 op=LOAD Apr 12 18:30:38.522000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:38.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643966626434343231376565626532643038636663303764363232 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit: BPF prog-id=115 op=LOAD Apr 12 18:30:38.539000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:38.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643966626434343231376565626532643038636663303764363232 Apr 12 18:30:38.539000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:30:38.539000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:38.539000 audit: BPF prog-id=116 op=LOAD Apr 12 18:30:38.539000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2522 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:38.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335643966626434343231376565626532643038636663303764363232 Apr 12 18:30:38.716946 env[1313]: time="2024-04-12T18:30:38.716900978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-nphz5,Uid:e4858b5c-abdd-473f-a425-98ecb65f45cc,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb\"" Apr 12 18:30:38.718952 env[1313]: time="2024-04-12T18:30:38.718804210Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:30:38.953190 kubelet[2440]: E0412 18:30:38.953129 2440 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:30:38.954566 kubelet[2440]: E0412 18:30:38.953260 2440 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-kube-proxy podName:9bbcbad9-6148-4a95-a5f9-6d1dc492e828 nodeName:}" failed. No retries permitted until 2024-04-12 18:30:39.453228118 +0000 UTC m=+16.592310559 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/9bbcbad9-6148-4a95-a5f9-6d1dc492e828-kube-proxy") pod "kube-proxy-z6fd4" (UID: "9bbcbad9-6148-4a95-a5f9-6d1dc492e828") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:30:39.365528 systemd[1]: run-containerd-runc-k8s.io-35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb-runc.VsyZXt.mount: Deactivated successfully. Apr 12 18:30:39.586085 env[1313]: time="2024-04-12T18:30:39.586026185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z6fd4,Uid:9bbcbad9-6148-4a95-a5f9-6d1dc492e828,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:39.631725 env[1313]: time="2024-04-12T18:30:39.631573722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:39.632074 env[1313]: time="2024-04-12T18:30:39.632042011Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:39.632193 env[1313]: time="2024-04-12T18:30:39.632171082Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:39.632511 env[1313]: time="2024-04-12T18:30:39.632457903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553 pid=2565 runtime=io.containerd.runc.v2 Apr 12 18:30:39.650843 systemd[1]: Started cri-containerd-d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553.scope. Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit: BPF prog-id=117 op=LOAD Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438356465306364386336333066653765383638613432643162623431 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438356465306364386336333066653765383638613432643162623431 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit: BPF prog-id=118 op=LOAD Apr 12 18:30:39.663000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438356465306364386336333066653765383638613432643162623431 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit: BPF prog-id=119 op=LOAD Apr 12 18:30:39.663000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438356465306364386336333066653765383638613432643162623431 Apr 12 18:30:39.663000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:30:39.663000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.663000 audit: BPF prog-id=120 op=LOAD Apr 12 18:30:39.663000 audit[2577]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2565 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438356465306364386336333066653765383638613432643162623431 Apr 12 18:30:39.677023 env[1313]: time="2024-04-12T18:30:39.676980308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-z6fd4,Uid:9bbcbad9-6148-4a95-a5f9-6d1dc492e828,Namespace:kube-system,Attempt:0,} returns sandbox id \"d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553\"" Apr 12 18:30:39.680928 env[1313]: time="2024-04-12T18:30:39.680887889Z" level=info msg="CreateContainer within sandbox \"d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:30:39.725317 env[1313]: time="2024-04-12T18:30:39.725245625Z" level=info msg="CreateContainer within sandbox \"d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"30e591a8c7b69a1792cc48c8121f6cd9b92aaf0dd6cf5fcc6f6417b2e3cabba6\"" Apr 12 18:30:39.727666 env[1313]: time="2024-04-12T18:30:39.727562071Z" level=info msg="StartContainer for \"30e591a8c7b69a1792cc48c8121f6cd9b92aaf0dd6cf5fcc6f6417b2e3cabba6\"" Apr 12 18:30:39.744355 systemd[1]: Started cri-containerd-30e591a8c7b69a1792cc48c8121f6cd9b92aaf0dd6cf5fcc6f6417b2e3cabba6.scope. Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2565 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653539316138633762363961313739326363343863383132316636 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.760000 audit: BPF prog-id=121 op=LOAD Apr 12 18:30:39.760000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2565 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653539316138633762363961313739326363343863383132316636 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.761000 audit: BPF prog-id=122 op=LOAD Apr 12 18:30:39.761000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2565 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653539316138633762363961313739326363343863383132316636 Apr 12 18:30:39.762000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:30:39.762000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:39.762000 audit: BPF prog-id=123 op=LOAD Apr 12 18:30:39.762000 audit[2608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2565 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330653539316138633762363961313739326363343863383132316636 Apr 12 18:30:39.784114 env[1313]: time="2024-04-12T18:30:39.781446895Z" level=info msg="StartContainer for \"30e591a8c7b69a1792cc48c8121f6cd9b92aaf0dd6cf5fcc6f6417b2e3cabba6\" returns successfully" Apr 12 18:30:39.851000 audit[2660]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:39.851000 audit[2660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2f1cdd0 a2=0 a3=1 items=0 ppid=2619 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:30:39.853000 audit[2661]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.853000 audit[2661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc44bb8a0 a2=0 a3=1 items=0 ppid=2619 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:30:39.854000 audit[2662]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:39.854000 audit[2662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe10f6620 a2=0 a3=1 items=0 ppid=2619 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:30:39.859000 audit[2663]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.859000 audit[2663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd667e50 a2=0 a3=1 items=0 ppid=2619 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:30:39.859000 audit[2664]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:39.859000 audit[2664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff91ed150 a2=0 a3=1 items=0 ppid=2619 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:30:39.860000 audit[2665]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.860000 audit[2665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc86c980 a2=0 a3=1 items=0 ppid=2619 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:30:39.953000 audit[2666]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.953000 audit[2666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdf6fb6c0 a2=0 a3=1 items=0 ppid=2619 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:30:39.956000 audit[2668]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.956000 audit[2668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe787d7e0 a2=0 a3=1 items=0 ppid=2619 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:30:39.959000 audit[2671]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.959000 audit[2671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdfae35b0 a2=0 a3=1 items=0 ppid=2619 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:30:39.960000 audit[2672]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.960000 audit[2672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc16ad050 a2=0 a3=1 items=0 ppid=2619 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:30:39.963000 audit[2674]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.963000 audit[2674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdef36270 a2=0 a3=1 items=0 ppid=2619 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:30:39.966000 audit[2675]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.966000 audit[2675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0a46020 a2=0 a3=1 items=0 ppid=2619 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:30:39.968000 audit[2677]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.968000 audit[2677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc67d0bf0 a2=0 a3=1 items=0 ppid=2619 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:30:39.972000 audit[2680]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.972000 audit[2680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe0d5d10 a2=0 a3=1 items=0 ppid=2619 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:30:39.973000 audit[2681]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.973000 audit[2681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4cd64b0 a2=0 a3=1 items=0 ppid=2619 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:30:39.976000 audit[2683]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.976000 audit[2683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4056bf0 a2=0 a3=1 items=0 ppid=2619 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:30:39.977000 audit[2684]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.977000 audit[2684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6c75800 a2=0 a3=1 items=0 ppid=2619 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:30:39.979000 audit[2686]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.979000 audit[2686]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8abc2a0 a2=0 a3=1 items=0 ppid=2619 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:30:39.982000 audit[2689]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.982000 audit[2689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff796adc0 a2=0 a3=1 items=0 ppid=2619 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:30:39.985000 audit[2692]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.985000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffecbd1370 a2=0 a3=1 items=0 ppid=2619 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:30:39.987000 audit[2693]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.987000 audit[2693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffca220750 a2=0 a3=1 items=0 ppid=2619 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:30:39.989000 audit[2695]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.989000 audit[2695]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd5963a20 a2=0 a3=1 items=0 ppid=2619 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:30:39.992000 audit[2698]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.992000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffda0bf5a0 a2=0 a3=1 items=0 ppid=2619 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:30:39.994000 audit[2699]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.994000 audit[2699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff89a7f90 a2=0 a3=1 items=0 ppid=2619 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:30:39.996000 audit[2701]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:30:39.996000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc944e290 a2=0 a3=1 items=0 ppid=2619 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:39.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:30:40.035000 audit[2707]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:40.035000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffea49a3f0 a2=0 a3=1 items=0 ppid=2619 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:40.063000 audit[2707]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:40.063000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffea49a3f0 a2=0 a3=1 items=0 ppid=2619 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:40.068000 audit[2712]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.068000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffca4b9e30 a2=0 a3=1 items=0 ppid=2619 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:30:40.079000 audit[2714]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.079000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffff49c840 a2=0 a3=1 items=0 ppid=2619 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:30:40.083000 audit[2717]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.083000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdcc12dc0 a2=0 a3=1 items=0 ppid=2619 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:30:40.084000 audit[2718]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.084000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe83f0bd0 a2=0 a3=1 items=0 ppid=2619 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:30:40.087000 audit[2720]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.087000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffca078770 a2=0 a3=1 items=0 ppid=2619 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:30:40.088000 audit[2721]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.088000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffccab2ca0 a2=0 a3=1 items=0 ppid=2619 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:30:40.090000 audit[2723]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.090000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe485070 a2=0 a3=1 items=0 ppid=2619 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:30:40.093000 audit[2726]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.093000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffe51f0f0 a2=0 a3=1 items=0 ppid=2619 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:30:40.094000 audit[2727]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.094000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff47dfc20 a2=0 a3=1 items=0 ppid=2619 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:30:40.096000 audit[2729]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.096000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa82fae0 a2=0 a3=1 items=0 ppid=2619 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:30:40.097000 audit[2730]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.097000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd3bd300 a2=0 a3=1 items=0 ppid=2619 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:30:40.099000 audit[2732]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.099000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0e68810 a2=0 a3=1 items=0 ppid=2619 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:30:40.103000 audit[2735]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.103000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb83f300 a2=0 a3=1 items=0 ppid=2619 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:30:40.106000 audit[2738]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.106000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd96a0bb0 a2=0 a3=1 items=0 ppid=2619 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:30:40.107000 audit[2739]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.107000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2991ab0 a2=0 a3=1 items=0 ppid=2619 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:30:40.110000 audit[2741]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.110000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd781f320 a2=0 a3=1 items=0 ppid=2619 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:30:40.113000 audit[2744]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.113000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff5f9f0f0 a2=0 a3=1 items=0 ppid=2619 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:30:40.114000 audit[2745]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.114000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff38e0500 a2=0 a3=1 items=0 ppid=2619 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:30:40.116000 audit[2747]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.116000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe055f960 a2=0 a3=1 items=0 ppid=2619 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:30:40.117000 audit[2748]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.117000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbe6d710 a2=0 a3=1 items=0 ppid=2619 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:30:40.120000 audit[2750]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.120000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdd848460 a2=0 a3=1 items=0 ppid=2619 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:30:40.126000 audit[2753]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:30:40.126000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffdd3b550 a2=0 a3=1 items=0 ppid=2619 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:30:40.128000 audit[2755]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:30:40.128000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffe8c9c690 a2=0 a3=1 items=0 ppid=2619 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.128000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:40.129000 audit[2755]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:30:40.129000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe8c9c690 a2=0 a3=1 items=0 ppid=2619 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:40.129000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:40.365397 systemd[1]: run-containerd-runc-k8s.io-d85de0cd8c630fe7e868a42d1bb410a8ff695733af97b9576e8f9c5c9b60e553-runc.4ig28x.mount: Deactivated successfully. Apr 12 18:30:41.081730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount506692196.mount: Deactivated successfully. Apr 12 18:30:41.799737 env[1313]: time="2024-04-12T18:30:41.799654669Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:41.803496 env[1313]: time="2024-04-12T18:30:41.803442986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:41.811487 env[1313]: time="2024-04-12T18:30:41.811442111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:41.816481 env[1313]: time="2024-04-12T18:30:41.816439070Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:41.817266 env[1313]: time="2024-04-12T18:30:41.817208740Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:30:41.821665 env[1313]: time="2024-04-12T18:30:41.821577219Z" level=info msg="CreateContainer within sandbox \"35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:30:41.852676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2491926695.mount: Deactivated successfully. Apr 12 18:30:41.856803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1696504809.mount: Deactivated successfully. Apr 12 18:30:41.873304 env[1313]: time="2024-04-12T18:30:41.873251016Z" level=info msg="CreateContainer within sandbox \"35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff\"" Apr 12 18:30:41.874043 env[1313]: time="2024-04-12T18:30:41.874013607Z" level=info msg="StartContainer for \"62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff\"" Apr 12 18:30:41.892182 systemd[1]: Started cri-containerd-62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff.scope. Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.905000 audit: BPF prog-id=124 op=LOAD Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2522 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:41.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393436666666376138636536326262653331356439393837326162 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2522 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:41.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393436666666376138636536326262653331356439393837326162 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit: BPF prog-id=125 op=LOAD Apr 12 18:30:41.906000 audit[2763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2522 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:41.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393436666666376138636536326262653331356439393837326162 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.906000 audit: BPF prog-id=126 op=LOAD Apr 12 18:30:41.906000 audit[2763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2522 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:41.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393436666666376138636536326262653331356439393837326162 Apr 12 18:30:41.907000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:30:41.907000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { perfmon } for pid=2763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit[2763]: AVC avc: denied { bpf } for pid=2763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:41.907000 audit: BPF prog-id=127 op=LOAD Apr 12 18:30:41.907000 audit[2763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2522 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:41.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632393436666666376138636536326262653331356439393837326162 Apr 12 18:30:41.926678 env[1313]: time="2024-04-12T18:30:41.926616224Z" level=info msg="StartContainer for \"62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff\" returns successfully" Apr 12 18:30:42.073395 kubelet[2440]: I0412 18:30:42.073266 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-z6fd4" podStartSLOduration=5.073226665 podCreationTimestamp="2024-04-12 18:30:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:30:40.074695628 +0000 UTC m=+17.213778069" watchObservedRunningTime="2024-04-12 18:30:42.073226665 +0000 UTC m=+19.212309106" Apr 12 18:30:44.323000 audit[2795]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.330360 kernel: kauditd_printk_skb: 357 callbacks suppressed Apr 12 18:30:44.330486 kernel: audit: type=1325 audit(1712946644.323:1072): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.323000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7761f50 a2=0 a3=1 items=0 ppid=2619 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.370437 kernel: audit: type=1300 audit(1712946644.323:1072): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7761f50 a2=0 a3=1 items=0 ppid=2619 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.370701 kernel: audit: type=1327 audit(1712946644.323:1072): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.323000 audit[2795]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.397990 kernel: audit: type=1325 audit(1712946644.323:1073): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.398089 kernel: audit: type=1300 audit(1712946644.323:1073): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7761f50 a2=0 a3=1 items=0 ppid=2619 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.323000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7761f50 a2=0 a3=1 items=0 ppid=2619 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.448155 kernel: audit: type=1327 audit(1712946644.323:1073): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.375000 audit[2797]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.467553 kernel: audit: type=1325 audit(1712946644.375:1074): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.375000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc21e3540 a2=0 a3=1 items=0 ppid=2619 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.504016 kernel: audit: type=1300 audit(1712946644.375:1074): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc21e3540 a2=0 a3=1 items=0 ppid=2619 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.523983 kernel: audit: type=1327 audit(1712946644.375:1074): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.397000 audit[2797]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.543630 kernel: audit: type=1325 audit(1712946644.397:1075): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:44.397000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc21e3540 a2=0 a3=1 items=0 ppid=2619 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:44.557516 kubelet[2440]: I0412 18:30:44.557453 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-nphz5" podStartSLOduration=3.458035018 podCreationTimestamp="2024-04-12 18:30:38 +0000 UTC" firstStartedPulling="2024-04-12 18:30:38.718349081 +0000 UTC m=+15.857431482" lastFinishedPulling="2024-04-12 18:30:41.817722187 +0000 UTC m=+18.956804588" observedRunningTime="2024-04-12 18:30:42.075030471 +0000 UTC m=+19.214112912" watchObservedRunningTime="2024-04-12 18:30:44.557408124 +0000 UTC m=+21.696490565" Apr 12 18:30:44.558184 kubelet[2440]: I0412 18:30:44.558165 2440 topology_manager.go:215] "Topology Admit Handler" podUID="a3c606ba-529a-4f4f-928d-4246e4bdf5cf" podNamespace="calico-system" podName="calico-typha-554fdc84f6-t5q9h" Apr 12 18:30:44.564252 systemd[1]: Created slice kubepods-besteffort-poda3c606ba_529a_4f4f_928d_4246e4bdf5cf.slice. Apr 12 18:30:44.652312 kubelet[2440]: I0412 18:30:44.652266 2440 topology_manager.go:215] "Topology Admit Handler" podUID="42523868-df90-46ab-9623-38b73d9024b3" podNamespace="calico-system" podName="calico-node-gr54h" Apr 12 18:30:44.658726 systemd[1]: Created slice kubepods-besteffort-pod42523868_df90_46ab_9623_38b73d9024b3.slice. Apr 12 18:30:44.697516 kubelet[2440]: I0412 18:30:44.697468 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a3c606ba-529a-4f4f-928d-4246e4bdf5cf-tigera-ca-bundle\") pod \"calico-typha-554fdc84f6-t5q9h\" (UID: \"a3c606ba-529a-4f4f-928d-4246e4bdf5cf\") " pod="calico-system/calico-typha-554fdc84f6-t5q9h" Apr 12 18:30:44.697732 kubelet[2440]: I0412 18:30:44.697720 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/a3c606ba-529a-4f4f-928d-4246e4bdf5cf-typha-certs\") pod \"calico-typha-554fdc84f6-t5q9h\" (UID: \"a3c606ba-529a-4f4f-928d-4246e4bdf5cf\") " pod="calico-system/calico-typha-554fdc84f6-t5q9h" Apr 12 18:30:44.697843 kubelet[2440]: I0412 18:30:44.697832 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-cni-bin-dir\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.697962 kubelet[2440]: I0412 18:30:44.697951 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/42523868-df90-46ab-9623-38b73d9024b3-node-certs\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698076 kubelet[2440]: I0412 18:30:44.698066 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-lib-modules\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698232 kubelet[2440]: I0412 18:30:44.698220 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-var-run-calico\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698345 kubelet[2440]: I0412 18:30:44.698334 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6sfbp\" (UniqueName: \"kubernetes.io/projected/a3c606ba-529a-4f4f-928d-4246e4bdf5cf-kube-api-access-6sfbp\") pod \"calico-typha-554fdc84f6-t5q9h\" (UID: \"a3c606ba-529a-4f4f-928d-4246e4bdf5cf\") " pod="calico-system/calico-typha-554fdc84f6-t5q9h" Apr 12 18:30:44.698452 kubelet[2440]: I0412 18:30:44.698440 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9gjlk\" (UniqueName: \"kubernetes.io/projected/42523868-df90-46ab-9623-38b73d9024b3-kube-api-access-9gjlk\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698570 kubelet[2440]: I0412 18:30:44.698559 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-cni-log-dir\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698680 kubelet[2440]: I0412 18:30:44.698669 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-xtables-lock\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698787 kubelet[2440]: I0412 18:30:44.698776 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/42523868-df90-46ab-9623-38b73d9024b3-tigera-ca-bundle\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698888 kubelet[2440]: I0412 18:30:44.698878 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-var-lib-calico\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.698986 kubelet[2440]: I0412 18:30:44.698975 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-cni-net-dir\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.699092 kubelet[2440]: I0412 18:30:44.699075 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-policysync\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.699199 kubelet[2440]: I0412 18:30:44.699189 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/42523868-df90-46ab-9623-38b73d9024b3-flexvol-driver-host\") pod \"calico-node-gr54h\" (UID: \"42523868-df90-46ab-9623-38b73d9024b3\") " pod="calico-system/calico-node-gr54h" Apr 12 18:30:44.761477 kubelet[2440]: I0412 18:30:44.761408 2440 topology_manager.go:215] "Topology Admit Handler" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" podNamespace="calico-system" podName="csi-node-driver-n4pzt" Apr 12 18:30:44.761741 kubelet[2440]: E0412 18:30:44.761702 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:44.800566 kubelet[2440]: I0412 18:30:44.800533 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/446d9dbf-1c3e-4466-84cf-c06af2e69bd9-varrun\") pod \"csi-node-driver-n4pzt\" (UID: \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\") " pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:44.800762 kubelet[2440]: I0412 18:30:44.800749 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/446d9dbf-1c3e-4466-84cf-c06af2e69bd9-socket-dir\") pod \"csi-node-driver-n4pzt\" (UID: \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\") " pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:44.800890 kubelet[2440]: I0412 18:30:44.800878 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvhrd\" (UniqueName: \"kubernetes.io/projected/446d9dbf-1c3e-4466-84cf-c06af2e69bd9-kube-api-access-rvhrd\") pod \"csi-node-driver-n4pzt\" (UID: \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\") " pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:44.801024 kubelet[2440]: I0412 18:30:44.801012 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/446d9dbf-1c3e-4466-84cf-c06af2e69bd9-kubelet-dir\") pod \"csi-node-driver-n4pzt\" (UID: \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\") " pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:44.801195 kubelet[2440]: I0412 18:30:44.801183 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/446d9dbf-1c3e-4466-84cf-c06af2e69bd9-registration-dir\") pod \"csi-node-driver-n4pzt\" (UID: \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\") " pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:44.815665 kubelet[2440]: E0412 18:30:44.815627 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.815665 kubelet[2440]: W0412 18:30:44.815656 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.815850 kubelet[2440]: E0412 18:30:44.815691 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.816687 kubelet[2440]: E0412 18:30:44.816655 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.816687 kubelet[2440]: W0412 18:30:44.816677 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.816833 kubelet[2440]: E0412 18:30:44.816698 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.835909 kubelet[2440]: E0412 18:30:44.835864 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.835909 kubelet[2440]: W0412 18:30:44.835885 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.835909 kubelet[2440]: E0412 18:30:44.835907 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.851401 kubelet[2440]: E0412 18:30:44.851365 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.851401 kubelet[2440]: W0412 18:30:44.851400 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.851592 kubelet[2440]: E0412 18:30:44.851423 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.871283 env[1313]: time="2024-04-12T18:30:44.870852419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-554fdc84f6-t5q9h,Uid:a3c606ba-529a-4f4f-928d-4246e4bdf5cf,Namespace:calico-system,Attempt:0,}" Apr 12 18:30:44.902619 kubelet[2440]: E0412 18:30:44.902469 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.902782 kubelet[2440]: W0412 18:30:44.902759 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.902858 kubelet[2440]: E0412 18:30:44.902847 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.903163 kubelet[2440]: E0412 18:30:44.903150 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.903254 kubelet[2440]: W0412 18:30:44.903241 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.903328 kubelet[2440]: E0412 18:30:44.903318 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.903919 kubelet[2440]: E0412 18:30:44.903901 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.904047 kubelet[2440]: W0412 18:30:44.904032 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.904134 kubelet[2440]: E0412 18:30:44.904123 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.904710 kubelet[2440]: E0412 18:30:44.904693 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.904837 kubelet[2440]: W0412 18:30:44.904822 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.904911 kubelet[2440]: E0412 18:30:44.904902 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.905203 kubelet[2440]: E0412 18:30:44.905189 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.905303 kubelet[2440]: W0412 18:30:44.905280 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.905376 kubelet[2440]: E0412 18:30:44.905366 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.905918 kubelet[2440]: E0412 18:30:44.905899 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.906023 kubelet[2440]: W0412 18:30:44.906009 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.906185 kubelet[2440]: E0412 18:30:44.906173 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.911212 kubelet[2440]: E0412 18:30:44.910656 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.911212 kubelet[2440]: W0412 18:30:44.910685 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.911212 kubelet[2440]: E0412 18:30:44.910715 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.914862 kubelet[2440]: E0412 18:30:44.914828 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.914862 kubelet[2440]: W0412 18:30:44.914852 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.915112 kubelet[2440]: E0412 18:30:44.914970 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.915240 kubelet[2440]: E0412 18:30:44.915213 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.915240 kubelet[2440]: W0412 18:30:44.915227 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.915340 kubelet[2440]: E0412 18:30:44.915320 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.918366 kubelet[2440]: E0412 18:30:44.918338 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.918366 kubelet[2440]: W0412 18:30:44.918363 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.918533 kubelet[2440]: E0412 18:30:44.918472 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.919056 kubelet[2440]: E0412 18:30:44.919029 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.919056 kubelet[2440]: W0412 18:30:44.919057 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.919177 kubelet[2440]: E0412 18:30:44.919153 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.919240 env[1313]: time="2024-04-12T18:30:44.918809431Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:44.919240 env[1313]: time="2024-04-12T18:30:44.918851708Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:44.919240 env[1313]: time="2024-04-12T18:30:44.918861548Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:44.919447 env[1313]: time="2024-04-12T18:30:44.919413314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0aacdc9f72be615208bb464cd071f0f9f1603dab76ad1b7dda97a22fdad8cc9e pid=2824 runtime=io.containerd.runc.v2 Apr 12 18:30:44.920672 kubelet[2440]: E0412 18:30:44.920641 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.920672 kubelet[2440]: W0412 18:30:44.920662 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.920784 kubelet[2440]: E0412 18:30:44.920705 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.920979 kubelet[2440]: E0412 18:30:44.920950 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.920979 kubelet[2440]: W0412 18:30:44.920967 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.921053 kubelet[2440]: E0412 18:30:44.921033 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.921808 kubelet[2440]: E0412 18:30:44.921782 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.921882 kubelet[2440]: W0412 18:30:44.921799 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.921959 kubelet[2440]: E0412 18:30:44.921937 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.923617 kubelet[2440]: E0412 18:30:44.923593 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.923752 kubelet[2440]: W0412 18:30:44.923737 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.924048 kubelet[2440]: E0412 18:30:44.924036 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.924129 kubelet[2440]: W0412 18:30:44.924117 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.924322 kubelet[2440]: E0412 18:30:44.924311 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.924394 kubelet[2440]: W0412 18:30:44.924383 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.924636 kubelet[2440]: E0412 18:30:44.924622 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.924722 kubelet[2440]: W0412 18:30:44.924711 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.924914 kubelet[2440]: E0412 18:30:44.924902 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.924991 kubelet[2440]: W0412 18:30:44.924978 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.925058 kubelet[2440]: E0412 18:30:44.925047 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.925313 kubelet[2440]: E0412 18:30:44.925301 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.925391 kubelet[2440]: W0412 18:30:44.925379 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.925455 kubelet[2440]: E0412 18:30:44.925445 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.925565 kubelet[2440]: E0412 18:30:44.925554 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.925854 kubelet[2440]: E0412 18:30:44.925840 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.925940 kubelet[2440]: W0412 18:30:44.925929 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.925995 kubelet[2440]: E0412 18:30:44.925986 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.926085 kubelet[2440]: E0412 18:30:44.926074 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.926159 kubelet[2440]: E0412 18:30:44.926150 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.926407 kubelet[2440]: E0412 18:30:44.926392 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.926490 kubelet[2440]: W0412 18:30:44.926477 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.926611 kubelet[2440]: E0412 18:30:44.926600 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.927010 kubelet[2440]: E0412 18:30:44.926995 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.927095 kubelet[2440]: W0412 18:30:44.927083 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.927156 kubelet[2440]: E0412 18:30:44.927146 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.927239 kubelet[2440]: E0412 18:30:44.927227 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.927445 kubelet[2440]: E0412 18:30:44.927435 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.927539 kubelet[2440]: W0412 18:30:44.927526 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.927622 kubelet[2440]: E0412 18:30:44.927612 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.929683 kubelet[2440]: E0412 18:30:44.929664 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.929806 kubelet[2440]: W0412 18:30:44.929792 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.929881 kubelet[2440]: E0412 18:30:44.929871 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.945079 kubelet[2440]: E0412 18:30:44.945044 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:44.945079 kubelet[2440]: W0412 18:30:44.945066 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:44.945079 kubelet[2440]: E0412 18:30:44.945088 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:44.950312 systemd[1]: Started cri-containerd-0aacdc9f72be615208bb464cd071f0f9f1603dab76ad1b7dda97a22fdad8cc9e.scope. Apr 12 18:30:44.965477 env[1313]: time="2024-04-12T18:30:44.965435805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gr54h,Uid:42523868-df90-46ab-9623-38b73d9024b3,Namespace:calico-system,Attempt:0,}" Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.970000 audit: BPF prog-id=128 op=LOAD Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2824 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061616364633966373262653631353230386262343634636430373166 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2824 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061616364633966373262653631353230386262343634636430373166 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit: BPF prog-id=129 op=LOAD Apr 12 18:30:44.971000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2824 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061616364633966373262653631353230386262343634636430373166 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit: BPF prog-id=130 op=LOAD Apr 12 18:30:44.971000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2824 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061616364633966373262653631353230386262343634636430373166 Apr 12 18:30:44.971000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:30:44.971000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:44.971000 audit: BPF prog-id=131 op=LOAD Apr 12 18:30:44.971000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2824 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:44.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061616364633966373262653631353230386262343634636430373166 Apr 12 18:30:45.002248 env[1313]: time="2024-04-12T18:30:45.002207546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-554fdc84f6-t5q9h,Uid:a3c606ba-529a-4f4f-928d-4246e4bdf5cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"0aacdc9f72be615208bb464cd071f0f9f1603dab76ad1b7dda97a22fdad8cc9e\"" Apr 12 18:30:45.005412 env[1313]: time="2024-04-12T18:30:45.005373274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:30:45.038460 env[1313]: time="2024-04-12T18:30:45.038379915Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:30:45.038680 env[1313]: time="2024-04-12T18:30:45.038652938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:30:45.038768 env[1313]: time="2024-04-12T18:30:45.038746653Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:30:45.039136 env[1313]: time="2024-04-12T18:30:45.039088552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6 pid=2880 runtime=io.containerd.runc.v2 Apr 12 18:30:45.054451 systemd[1]: Started cri-containerd-fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6.scope. Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.077000 audit: BPF prog-id=132 op=LOAD Apr 12 18:30:45.078000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.078000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2880 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235613062306531646432376535363836633635346434323264 Apr 12 18:30:45.078000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.078000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2880 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235613062306531646432376535363836633635346434323264 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit: BPF prog-id=133 op=LOAD Apr 12 18:30:45.079000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2880 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235613062306531646432376535363836633635346434323264 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.079000 audit: BPF prog-id=134 op=LOAD Apr 12 18:30:45.079000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2880 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235613062306531646432376535363836633635346434323264 Apr 12 18:30:45.080000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:30:45.080000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:45.080000 audit: BPF prog-id=135 op=LOAD Apr 12 18:30:45.080000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2880 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366235613062306531646432376535363836633635346434323264 Apr 12 18:30:45.097959 env[1313]: time="2024-04-12T18:30:45.097917709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gr54h,Uid:42523868-df90-46ab-9623-38b73d9024b3,Namespace:calico-system,Attempt:0,} returns sandbox id \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\"" Apr 12 18:30:45.478000 audit[2917]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:45.478000 audit[2917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffcd5c8330 a2=0 a3=1 items=0 ppid=2619 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:45.483000 audit[2917]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:30:45.483000 audit[2917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffcd5c8330 a2=0 a3=1 items=0 ppid=2619 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:45.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:30:46.358125 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2283028570.mount: Deactivated successfully. Apr 12 18:30:46.993577 kubelet[2440]: E0412 18:30:46.993534 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:47.383210 env[1313]: time="2024-04-12T18:30:47.383084289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:47.391706 env[1313]: time="2024-04-12T18:30:47.391661744Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:47.398688 env[1313]: time="2024-04-12T18:30:47.398645173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:47.405216 env[1313]: time="2024-04-12T18:30:47.405173428Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:47.406125 env[1313]: time="2024-04-12T18:30:47.406095974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:30:47.409810 env[1313]: time="2024-04-12T18:30:47.409763878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:30:47.423470 env[1313]: time="2024-04-12T18:30:47.423421954Z" level=info msg="CreateContainer within sandbox \"0aacdc9f72be615208bb464cd071f0f9f1603dab76ad1b7dda97a22fdad8cc9e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:30:47.478624 env[1313]: time="2024-04-12T18:30:47.478566868Z" level=info msg="CreateContainer within sandbox \"0aacdc9f72be615208bb464cd071f0f9f1603dab76ad1b7dda97a22fdad8cc9e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c0acb752df0d2a80fc4e4d04252e3f44e9469219c4dc7788731e279204a44342\"" Apr 12 18:30:47.483989 env[1313]: time="2024-04-12T18:30:47.483935312Z" level=info msg="StartContainer for \"c0acb752df0d2a80fc4e4d04252e3f44e9469219c4dc7788731e279204a44342\"" Apr 12 18:30:47.512216 systemd[1]: Started cri-containerd-c0acb752df0d2a80fc4e4d04252e3f44e9469219c4dc7788731e279204a44342.scope. Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.525000 audit: BPF prog-id=136 op=LOAD Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2824 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616362373532646630643261383066633465346430343235326533 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2824 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616362373532646630643261383066633465346430343235326533 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit: BPF prog-id=137 op=LOAD Apr 12 18:30:47.526000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2824 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616362373532646630643261383066633465346430343235326533 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit: BPF prog-id=138 op=LOAD Apr 12 18:30:47.526000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2824 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616362373532646630643261383066633465346430343235326533 Apr 12 18:30:47.526000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:30:47.526000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:47.526000 audit: BPF prog-id=139 op=LOAD Apr 12 18:30:47.526000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2824 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:47.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616362373532646630643261383066633465346430343235326533 Apr 12 18:30:47.554955 env[1313]: time="2024-04-12T18:30:47.554337047Z" level=info msg="StartContainer for \"c0acb752df0d2a80fc4e4d04252e3f44e9469219c4dc7788731e279204a44342\" returns successfully" Apr 12 18:30:48.087679 kubelet[2440]: I0412 18:30:48.087646 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-554fdc84f6-t5q9h" podStartSLOduration=1.684006758 podCreationTimestamp="2024-04-12 18:30:44 +0000 UTC" firstStartedPulling="2024-04-12 18:30:45.003449231 +0000 UTC m=+22.142531672" lastFinishedPulling="2024-04-12 18:30:47.407045158 +0000 UTC m=+24.546127599" observedRunningTime="2024-04-12 18:30:48.087052117 +0000 UTC m=+25.226134518" watchObservedRunningTime="2024-04-12 18:30:48.087602685 +0000 UTC m=+25.226685126" Apr 12 18:30:48.124298 kubelet[2440]: E0412 18:30:48.124270 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.124447 kubelet[2440]: W0412 18:30:48.124430 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.124563 kubelet[2440]: E0412 18:30:48.124551 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.124800 kubelet[2440]: E0412 18:30:48.124788 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.124873 kubelet[2440]: W0412 18:30:48.124861 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.124929 kubelet[2440]: E0412 18:30:48.124920 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.125138 kubelet[2440]: E0412 18:30:48.125127 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.125216 kubelet[2440]: W0412 18:30:48.125205 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.125319 kubelet[2440]: E0412 18:30:48.125309 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.125556 kubelet[2440]: E0412 18:30:48.125545 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.125630 kubelet[2440]: W0412 18:30:48.125619 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.125684 kubelet[2440]: E0412 18:30:48.125675 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.125901 kubelet[2440]: E0412 18:30:48.125889 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.125981 kubelet[2440]: W0412 18:30:48.125970 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.126045 kubelet[2440]: E0412 18:30:48.126036 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.126238 kubelet[2440]: E0412 18:30:48.126227 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.126318 kubelet[2440]: W0412 18:30:48.126308 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.126379 kubelet[2440]: E0412 18:30:48.126370 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.126591 kubelet[2440]: E0412 18:30:48.126579 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.126674 kubelet[2440]: W0412 18:30:48.126663 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.126737 kubelet[2440]: E0412 18:30:48.126729 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.126946 kubelet[2440]: E0412 18:30:48.126935 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.127022 kubelet[2440]: W0412 18:30:48.127011 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.127077 kubelet[2440]: E0412 18:30:48.127069 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.127272 kubelet[2440]: E0412 18:30:48.127262 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.127339 kubelet[2440]: W0412 18:30:48.127329 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.127404 kubelet[2440]: E0412 18:30:48.127395 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.127668 kubelet[2440]: E0412 18:30:48.127657 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.127740 kubelet[2440]: W0412 18:30:48.127729 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.127814 kubelet[2440]: E0412 18:30:48.127804 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.128020 kubelet[2440]: E0412 18:30:48.128010 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.128096 kubelet[2440]: W0412 18:30:48.128085 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.128158 kubelet[2440]: E0412 18:30:48.128149 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.128345 kubelet[2440]: E0412 18:30:48.128334 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.128413 kubelet[2440]: W0412 18:30:48.128403 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.128473 kubelet[2440]: E0412 18:30:48.128464 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.128687 kubelet[2440]: E0412 18:30:48.128677 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.128773 kubelet[2440]: W0412 18:30:48.128763 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.128828 kubelet[2440]: E0412 18:30:48.128819 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.129027 kubelet[2440]: E0412 18:30:48.129017 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.129106 kubelet[2440]: W0412 18:30:48.129095 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.129167 kubelet[2440]: E0412 18:30:48.129158 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.129355 kubelet[2440]: E0412 18:30:48.129345 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.129430 kubelet[2440]: W0412 18:30:48.129420 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.129484 kubelet[2440]: E0412 18:30:48.129476 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.138732 kubelet[2440]: E0412 18:30:48.138713 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.138855 kubelet[2440]: W0412 18:30:48.138841 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.138919 kubelet[2440]: E0412 18:30:48.138909 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.139155 kubelet[2440]: E0412 18:30:48.139143 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.139237 kubelet[2440]: W0412 18:30:48.139225 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.139300 kubelet[2440]: E0412 18:30:48.139290 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.139590 kubelet[2440]: E0412 18:30:48.139570 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.139590 kubelet[2440]: W0412 18:30:48.139587 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.139684 kubelet[2440]: E0412 18:30:48.139611 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.139791 kubelet[2440]: E0412 18:30:48.139766 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.139791 kubelet[2440]: W0412 18:30:48.139784 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.139849 kubelet[2440]: E0412 18:30:48.139797 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.139993 kubelet[2440]: E0412 18:30:48.139977 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.139993 kubelet[2440]: W0412 18:30:48.139990 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.140055 kubelet[2440]: E0412 18:30:48.140005 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.140201 kubelet[2440]: E0412 18:30:48.140184 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.140201 kubelet[2440]: W0412 18:30:48.140198 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.140269 kubelet[2440]: E0412 18:30:48.140214 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.140566 kubelet[2440]: E0412 18:30:48.140552 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.140639 kubelet[2440]: W0412 18:30:48.140628 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.140721 kubelet[2440]: E0412 18:30:48.140710 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.140983 kubelet[2440]: E0412 18:30:48.140963 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.140983 kubelet[2440]: W0412 18:30:48.140979 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.141086 kubelet[2440]: E0412 18:30:48.141004 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.141178 kubelet[2440]: E0412 18:30:48.141164 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.141178 kubelet[2440]: W0412 18:30:48.141177 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.141248 kubelet[2440]: E0412 18:30:48.141194 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.141395 kubelet[2440]: E0412 18:30:48.141377 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.141395 kubelet[2440]: W0412 18:30:48.141391 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.141471 kubelet[2440]: E0412 18:30:48.141407 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.141610 kubelet[2440]: E0412 18:30:48.141594 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.141666 kubelet[2440]: W0412 18:30:48.141617 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.141707 kubelet[2440]: E0412 18:30:48.141693 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.141893 kubelet[2440]: E0412 18:30:48.141874 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.141893 kubelet[2440]: W0412 18:30:48.141888 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.141998 kubelet[2440]: E0412 18:30:48.141985 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.142242 kubelet[2440]: E0412 18:30:48.142224 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.142242 kubelet[2440]: W0412 18:30:48.142239 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.142336 kubelet[2440]: E0412 18:30:48.142313 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.142459 kubelet[2440]: E0412 18:30:48.142436 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.142459 kubelet[2440]: W0412 18:30:48.142449 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.142571 kubelet[2440]: E0412 18:30:48.142463 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.143612 kubelet[2440]: E0412 18:30:48.143594 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.143697 kubelet[2440]: W0412 18:30:48.143684 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.144467 kubelet[2440]: E0412 18:30:48.144448 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.146143 kubelet[2440]: E0412 18:30:48.144907 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.146143 kubelet[2440]: W0412 18:30:48.145557 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.146143 kubelet[2440]: E0412 18:30:48.145580 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.146143 kubelet[2440]: E0412 18:30:48.145801 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.146143 kubelet[2440]: W0412 18:30:48.145811 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.146143 kubelet[2440]: E0412 18:30:48.145822 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.146143 kubelet[2440]: E0412 18:30:48.146143 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:48.147070 kubelet[2440]: W0412 18:30:48.146154 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:48.147070 kubelet[2440]: E0412 18:30:48.146165 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:48.797265 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3896430096.mount: Deactivated successfully. Apr 12 18:30:48.995586 kubelet[2440]: E0412 18:30:48.995235 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:49.079855 kubelet[2440]: I0412 18:30:49.079062 2440 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:30:49.135874 kubelet[2440]: E0412 18:30:49.135841 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.135874 kubelet[2440]: W0412 18:30:49.135866 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.135891 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136050 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138150 kubelet[2440]: W0412 18:30:49.136058 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136078 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136224 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138150 kubelet[2440]: W0412 18:30:49.136233 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136244 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136401 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138150 kubelet[2440]: W0412 18:30:49.136409 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138150 kubelet[2440]: E0412 18:30:49.136421 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136581 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138379 kubelet[2440]: W0412 18:30:49.136588 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136598 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136722 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138379 kubelet[2440]: W0412 18:30:49.136736 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136747 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136867 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138379 kubelet[2440]: W0412 18:30:49.136875 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.136892 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138379 kubelet[2440]: E0412 18:30:49.137011 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138610 kubelet[2440]: W0412 18:30:49.137018 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137034 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137163 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138610 kubelet[2440]: W0412 18:30:49.137170 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137185 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137303 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138610 kubelet[2440]: W0412 18:30:49.137310 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137326 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138610 kubelet[2440]: E0412 18:30:49.137560 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138610 kubelet[2440]: W0412 18:30:49.137568 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.137579 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.137727 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138854 kubelet[2440]: W0412 18:30:49.137741 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.137751 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.137879 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138854 kubelet[2440]: W0412 18:30:49.137893 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.137904 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.138066 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.138854 kubelet[2440]: W0412 18:30:49.138074 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.138854 kubelet[2440]: E0412 18:30:49.138085 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.139107 kubelet[2440]: E0412 18:30:49.138229 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.139107 kubelet[2440]: W0412 18:30:49.138237 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.139107 kubelet[2440]: E0412 18:30:49.138247 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.146472 kubelet[2440]: E0412 18:30:49.146433 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.146472 kubelet[2440]: W0412 18:30:49.146463 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.146727 kubelet[2440]: E0412 18:30:49.146484 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.146727 kubelet[2440]: E0412 18:30:49.146666 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.146727 kubelet[2440]: W0412 18:30:49.146684 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.146727 kubelet[2440]: E0412 18:30:49.146696 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.147159 kubelet[2440]: E0412 18:30:49.146857 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.147159 kubelet[2440]: W0412 18:30:49.146872 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.147159 kubelet[2440]: E0412 18:30:49.146883 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.147159 kubelet[2440]: E0412 18:30:49.147049 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.147159 kubelet[2440]: W0412 18:30:49.147061 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.147159 kubelet[2440]: E0412 18:30:49.147081 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.147743 kubelet[2440]: E0412 18:30:49.147413 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.147743 kubelet[2440]: W0412 18:30:49.147427 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.147743 kubelet[2440]: E0412 18:30:49.147450 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.147743 kubelet[2440]: E0412 18:30:49.147623 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.147743 kubelet[2440]: W0412 18:30:49.147633 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.147743 kubelet[2440]: E0412 18:30:49.147650 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.148351 kubelet[2440]: E0412 18:30:49.148010 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.148351 kubelet[2440]: W0412 18:30:49.148021 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.148351 kubelet[2440]: E0412 18:30:49.148040 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.148351 kubelet[2440]: E0412 18:30:49.148224 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.148351 kubelet[2440]: W0412 18:30:49.148233 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.148351 kubelet[2440]: E0412 18:30:49.148247 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.148583 kubelet[2440]: E0412 18:30:49.148388 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.148583 kubelet[2440]: W0412 18:30:49.148395 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.148583 kubelet[2440]: E0412 18:30:49.148407 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.148583 kubelet[2440]: E0412 18:30:49.148538 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.148583 kubelet[2440]: W0412 18:30:49.148547 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.148583 kubelet[2440]: E0412 18:30:49.148559 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.148715 kubelet[2440]: E0412 18:30:49.148704 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.148715 kubelet[2440]: W0412 18:30:49.148712 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.148759 kubelet[2440]: E0412 18:30:49.148724 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.149040 kubelet[2440]: E0412 18:30:49.148956 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.149040 kubelet[2440]: W0412 18:30:49.148969 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.149040 kubelet[2440]: E0412 18:30:49.148991 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.149667 kubelet[2440]: E0412 18:30:49.149468 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.149667 kubelet[2440]: W0412 18:30:49.149484 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.149667 kubelet[2440]: E0412 18:30:49.149531 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.149780 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.151042 kubelet[2440]: W0412 18:30:49.149791 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.149880 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.150026 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.151042 kubelet[2440]: W0412 18:30:49.150034 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.150059 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.150196 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.151042 kubelet[2440]: W0412 18:30:49.150204 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.150281 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.151042 kubelet[2440]: E0412 18:30:49.150386 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.153028 kubelet[2440]: W0412 18:30:49.150393 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.153028 kubelet[2440]: E0412 18:30:49.150410 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.153028 kubelet[2440]: E0412 18:30:49.150758 2440 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:30:49.153028 kubelet[2440]: W0412 18:30:49.150771 2440 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:30:49.153028 kubelet[2440]: E0412 18:30:49.150786 2440 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:30:49.180533 env[1313]: time="2024-04-12T18:30:49.180464856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:49.187360 env[1313]: time="2024-04-12T18:30:49.187318103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:49.191797 env[1313]: time="2024-04-12T18:30:49.191745330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:49.203321 env[1313]: time="2024-04-12T18:30:49.203270310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:49.203756 env[1313]: time="2024-04-12T18:30:49.203723924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:30:49.211896 env[1313]: time="2024-04-12T18:30:49.210175034Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:30:49.260144 env[1313]: time="2024-04-12T18:30:49.260069737Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407\"" Apr 12 18:30:49.260857 env[1313]: time="2024-04-12T18:30:49.260817054Z" level=info msg="StartContainer for \"34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407\"" Apr 12 18:30:49.289874 systemd[1]: Started cri-containerd-34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407.scope. Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2880 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363034663234383464663266376466346463383163306565326434 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit: BPF prog-id=140 op=LOAD Apr 12 18:30:49.314000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2880 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363034663234383464663266376466346463383163306565326434 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.314000 audit: BPF prog-id=141 op=LOAD Apr 12 18:30:49.314000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2880 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:49.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363034663234383464663266376466346463383163306565326434 Apr 12 18:30:49.315000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:30:49.315000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:49.315000 audit: BPF prog-id=142 op=LOAD Apr 12 18:30:49.315000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2880 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:49.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363034663234383464663266376466346463383163306565326434 Apr 12 18:30:49.335765 systemd[1]: cri-containerd-34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407.scope: Deactivated successfully. Apr 12 18:30:49.339605 env[1313]: time="2024-04-12T18:30:49.336769144Z" level=info msg="StartContainer for \"34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407\" returns successfully" Apr 12 18:30:49.346624 kernel: kauditd_printk_skb: 222 callbacks suppressed Apr 12 18:30:49.346757 kernel: audit: type=1334 audit(1712946649.340:1138): prog-id=142 op=UNLOAD Apr 12 18:30:49.340000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:30:49.715482 systemd[1]: run-containerd-runc-k8s.io-34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407-runc.axCzHl.mount: Deactivated successfully. Apr 12 18:30:49.715608 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407-rootfs.mount: Deactivated successfully. Apr 12 18:30:50.223339 env[1313]: time="2024-04-12T18:30:50.223284819Z" level=info msg="shim disconnected" id=34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407 Apr 12 18:30:50.223339 env[1313]: time="2024-04-12T18:30:50.223336497Z" level=warning msg="cleaning up after shim disconnected" id=34604f2484df2f7df4dc81c0ee2d42e4a824c6dcc23397ef4e163c2baeea4407 namespace=k8s.io Apr 12 18:30:50.223339 env[1313]: time="2024-04-12T18:30:50.223346936Z" level=info msg="cleaning up dead shim" Apr 12 18:30:50.230727 env[1313]: time="2024-04-12T18:30:50.230671562Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:30:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3074 runtime=io.containerd.runc.v2\n" Apr 12 18:30:50.993482 kubelet[2440]: E0412 18:30:50.993438 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:51.086406 env[1313]: time="2024-04-12T18:30:51.086369828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:30:52.994280 kubelet[2440]: E0412 18:30:52.993939 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:54.994532 kubelet[2440]: E0412 18:30:54.993988 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:55.304992 env[1313]: time="2024-04-12T18:30:55.304622379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:55.312317 env[1313]: time="2024-04-12T18:30:55.312270334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:55.316447 env[1313]: time="2024-04-12T18:30:55.316402994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:55.322492 env[1313]: time="2024-04-12T18:30:55.321954380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:30:55.322492 env[1313]: time="2024-04-12T18:30:55.322211126Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:30:55.329155 env[1313]: time="2024-04-12T18:30:55.326804243Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:30:55.363270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2472877716.mount: Deactivated successfully. Apr 12 18:30:55.389561 env[1313]: time="2024-04-12T18:30:55.389489757Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae\"" Apr 12 18:30:55.390379 env[1313]: time="2024-04-12T18:30:55.390350551Z" level=info msg="StartContainer for \"3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae\"" Apr 12 18:30:55.421466 systemd[1]: Started cri-containerd-3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae.scope. Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2880 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:55.485827 kernel: audit: type=1400 audit(1712946655.435:1139): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.485953 kernel: audit: type=1300 audit(1712946655.435:1139): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2880 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:55.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362356365303231343139646162633534333038333937626463333137 Apr 12 18:30:55.510785 kernel: audit: type=1327 audit(1712946655.435:1139): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362356365303231343139646162633534333038333937626463333137 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.529315 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.546969 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.566587 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.584684 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.584977 env[1313]: time="2024-04-12T18:30:55.584923229Z" level=info msg="StartContainer for \"3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae\" returns successfully" Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.603966 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.621836 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.641538 kernel: audit: type=1400 audit(1712946655.435:1140): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.435000 audit: BPF prog-id=143 op=LOAD Apr 12 18:30:55.435000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2880 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:55.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362356365303231343139646162633534333038333937626463333137 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.453000 audit: BPF prog-id=144 op=LOAD Apr 12 18:30:55.453000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2880 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:55.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362356365303231343139646162633534333038333937626463333137 Apr 12 18:30:55.486000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:30:55.486000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:30:55.486000 audit: BPF prog-id=145 op=LOAD Apr 12 18:30:55.486000 audit[3094]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2880 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:30:55.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362356365303231343139646162633534333038333937626463333137 Apr 12 18:30:56.527153 env[1313]: time="2024-04-12T18:30:56.527081019Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:30:56.529799 systemd[1]: cri-containerd-3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae.scope: Deactivated successfully. Apr 12 18:30:56.531000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:30:56.549978 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae-rootfs.mount: Deactivated successfully. Apr 12 18:30:56.553053 kubelet[2440]: I0412 18:30:56.553012 2440 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:30:56.575016 kubelet[2440]: I0412 18:30:56.574973 2440 topology_manager.go:215] "Topology Admit Handler" podUID="b8b1d27e-d077-4785-90cf-dbf172c7c41a" podNamespace="kube-system" podName="coredns-5dd5756b68-89kmr" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.581052 2440 topology_manager.go:215] "Topology Admit Handler" podUID="8ec51e14-34ab-4b15-9aa7-a409ca77a407" podNamespace="kube-system" podName="coredns-5dd5756b68-fxbgg" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.589296 2440 topology_manager.go:215] "Topology Admit Handler" podUID="50eb7f34-aa22-47f4-8edf-efd929da751c" podNamespace="calico-system" podName="calico-kube-controllers-5f9469bc77-7twzn" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.614436 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7d8f\" (UniqueName: \"kubernetes.io/projected/b8b1d27e-d077-4785-90cf-dbf172c7c41a-kube-api-access-f7d8f\") pod \"coredns-5dd5756b68-89kmr\" (UID: \"b8b1d27e-d077-4785-90cf-dbf172c7c41a\") " pod="kube-system/coredns-5dd5756b68-89kmr" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.614494 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4prfc\" (UniqueName: \"kubernetes.io/projected/8ec51e14-34ab-4b15-9aa7-a409ca77a407-kube-api-access-4prfc\") pod \"coredns-5dd5756b68-fxbgg\" (UID: \"8ec51e14-34ab-4b15-9aa7-a409ca77a407\") " pod="kube-system/coredns-5dd5756b68-fxbgg" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.614542 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/50eb7f34-aa22-47f4-8edf-efd929da751c-tigera-ca-bundle\") pod \"calico-kube-controllers-5f9469bc77-7twzn\" (UID: \"50eb7f34-aa22-47f4-8edf-efd929da751c\") " pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" Apr 12 18:30:56.905759 kubelet[2440]: I0412 18:30:56.614571 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vnkfv\" (UniqueName: \"kubernetes.io/projected/50eb7f34-aa22-47f4-8edf-efd929da751c-kube-api-access-vnkfv\") pod \"calico-kube-controllers-5f9469bc77-7twzn\" (UID: \"50eb7f34-aa22-47f4-8edf-efd929da751c\") " pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" Apr 12 18:30:56.580657 systemd[1]: Created slice kubepods-burstable-podb8b1d27e_d077_4785_90cf_dbf172c7c41a.slice. Apr 12 18:30:56.906102 kubelet[2440]: I0412 18:30:56.614606 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b8b1d27e-d077-4785-90cf-dbf172c7c41a-config-volume\") pod \"coredns-5dd5756b68-89kmr\" (UID: \"b8b1d27e-d077-4785-90cf-dbf172c7c41a\") " pod="kube-system/coredns-5dd5756b68-89kmr" Apr 12 18:30:56.906102 kubelet[2440]: I0412 18:30:56.614628 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8ec51e14-34ab-4b15-9aa7-a409ca77a407-config-volume\") pod \"coredns-5dd5756b68-fxbgg\" (UID: \"8ec51e14-34ab-4b15-9aa7-a409ca77a407\") " pod="kube-system/coredns-5dd5756b68-fxbgg" Apr 12 18:30:56.588414 systemd[1]: Created slice kubepods-burstable-pod8ec51e14_34ab_4b15_9aa7_a409ca77a407.slice. Apr 12 18:30:56.595303 systemd[1]: Created slice kubepods-besteffort-pod50eb7f34_aa22_47f4_8edf_efd929da751c.slice. Apr 12 18:30:56.999951 systemd[1]: Created slice kubepods-besteffort-pod446d9dbf_1c3e_4466_84cf_c06af2e69bd9.slice. Apr 12 18:30:57.002008 env[1313]: time="2024-04-12T18:30:57.001958326Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n4pzt,Uid:446d9dbf-1c3e-4466-84cf-c06af2e69bd9,Namespace:calico-system,Attempt:0,}" Apr 12 18:30:57.206897 env[1313]: time="2024-04-12T18:30:57.206487929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-89kmr,Uid:b8b1d27e-d077-4785-90cf-dbf172c7c41a,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:57.208909 env[1313]: time="2024-04-12T18:30:57.208871405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f9469bc77-7twzn,Uid:50eb7f34-aa22-47f4-8edf-efd929da751c,Namespace:calico-system,Attempt:0,}" Apr 12 18:30:57.209402 env[1313]: time="2024-04-12T18:30:57.209372259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fxbgg,Uid:8ec51e14-34ab-4b15-9aa7-a409ca77a407,Namespace:kube-system,Attempt:0,}" Apr 12 18:30:57.624638 env[1313]: time="2024-04-12T18:30:57.624529869Z" level=info msg="shim disconnected" id=3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae Apr 12 18:30:57.624638 env[1313]: time="2024-04-12T18:30:57.624579947Z" level=warning msg="cleaning up after shim disconnected" id=3b5ce021419dabc54308397bdc317d68d188e9c83256f8ba66c741fd17a825ae namespace=k8s.io Apr 12 18:30:57.624638 env[1313]: time="2024-04-12T18:30:57.624588666Z" level=info msg="cleaning up dead shim" Apr 12 18:30:57.633456 env[1313]: time="2024-04-12T18:30:57.633407529Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:30:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3143 runtime=io.containerd.runc.v2\n" Apr 12 18:30:57.883537 env[1313]: time="2024-04-12T18:30:57.883163589Z" level=error msg="Failed to destroy network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.883664 env[1313]: time="2024-04-12T18:30:57.883591767Z" level=error msg="encountered an error cleaning up failed sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.883695 env[1313]: time="2024-04-12T18:30:57.883655564Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n4pzt,Uid:446d9dbf-1c3e-4466-84cf-c06af2e69bd9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.884021 kubelet[2440]: E0412 18:30:57.883991 2440 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.884357 kubelet[2440]: E0412 18:30:57.884068 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:57.884357 kubelet[2440]: E0412 18:30:57.884089 2440 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-n4pzt" Apr 12 18:30:57.884357 kubelet[2440]: E0412 18:30:57.884161 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-n4pzt_calico-system(446d9dbf-1c3e-4466-84cf-c06af2e69bd9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-n4pzt_calico-system(446d9dbf-1c3e-4466-84cf-c06af2e69bd9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:57.912211 env[1313]: time="2024-04-12T18:30:57.912154327Z" level=error msg="Failed to destroy network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.912769 env[1313]: time="2024-04-12T18:30:57.912731617Z" level=error msg="encountered an error cleaning up failed sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.912921 env[1313]: time="2024-04-12T18:30:57.912892729Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fxbgg,Uid:8ec51e14-34ab-4b15-9aa7-a409ca77a407,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.913338 kubelet[2440]: E0412 18:30:57.913304 2440 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.913421 kubelet[2440]: E0412 18:30:57.913377 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fxbgg" Apr 12 18:30:57.913421 kubelet[2440]: E0412 18:30:57.913399 2440 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-fxbgg" Apr 12 18:30:57.913487 kubelet[2440]: E0412 18:30:57.913469 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-fxbgg_kube-system(8ec51e14-34ab-4b15-9aa7-a409ca77a407)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-fxbgg_kube-system(8ec51e14-34ab-4b15-9aa7-a409ca77a407)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fxbgg" podUID="8ec51e14-34ab-4b15-9aa7-a409ca77a407" Apr 12 18:30:57.917744 env[1313]: time="2024-04-12T18:30:57.917662962Z" level=error msg="Failed to destroy network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.918226 env[1313]: time="2024-04-12T18:30:57.918191894Z" level=error msg="encountered an error cleaning up failed sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.918374 env[1313]: time="2024-04-12T18:30:57.918338087Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f9469bc77-7twzn,Uid:50eb7f34-aa22-47f4-8edf-efd929da751c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.919945 kubelet[2440]: E0412 18:30:57.918789 2440 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.919945 kubelet[2440]: E0412 18:30:57.918842 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" Apr 12 18:30:57.919945 kubelet[2440]: E0412 18:30:57.918867 2440 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" Apr 12 18:30:57.920119 kubelet[2440]: E0412 18:30:57.918919 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5f9469bc77-7twzn_calico-system(50eb7f34-aa22-47f4-8edf-efd929da751c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5f9469bc77-7twzn_calico-system(50eb7f34-aa22-47f4-8edf-efd929da751c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" podUID="50eb7f34-aa22-47f4-8edf-efd929da751c" Apr 12 18:30:57.925204 env[1313]: time="2024-04-12T18:30:57.925150374Z" level=error msg="Failed to destroy network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.925707 env[1313]: time="2024-04-12T18:30:57.925669027Z" level=error msg="encountered an error cleaning up failed sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.925880 env[1313]: time="2024-04-12T18:30:57.925849857Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-89kmr,Uid:b8b1d27e-d077-4785-90cf-dbf172c7c41a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.927359 kubelet[2440]: E0412 18:30:57.926174 2440 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:57.927359 kubelet[2440]: E0412 18:30:57.926225 2440 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-89kmr" Apr 12 18:30:57.927359 kubelet[2440]: E0412 18:30:57.926247 2440 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-89kmr" Apr 12 18:30:57.927569 kubelet[2440]: E0412 18:30:57.926299 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-89kmr_kube-system(b8b1d27e-d077-4785-90cf-dbf172c7c41a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-89kmr_kube-system(b8b1d27e-d077-4785-90cf-dbf172c7c41a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-89kmr" podUID="b8b1d27e-d077-4785-90cf-dbf172c7c41a" Apr 12 18:30:58.110037 kubelet[2440]: I0412 18:30:58.109792 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:30:58.112413 env[1313]: time="2024-04-12T18:30:58.112346380Z" level=info msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" Apr 12 18:30:58.115489 kubelet[2440]: I0412 18:30:58.114148 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:30:58.117803 env[1313]: time="2024-04-12T18:30:58.117764263Z" level=info msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" Apr 12 18:30:58.119342 kubelet[2440]: I0412 18:30:58.119306 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:30:58.121726 env[1313]: time="2024-04-12T18:30:58.121691342Z" level=info msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" Apr 12 18:30:58.124156 kubelet[2440]: I0412 18:30:58.123485 2440 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:30:58.125980 env[1313]: time="2024-04-12T18:30:58.125943404Z" level=info msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" Apr 12 18:30:58.129827 env[1313]: time="2024-04-12T18:30:58.129789327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:30:58.184549 env[1313]: time="2024-04-12T18:30:58.184465526Z" level=error msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" failed" error="failed to destroy network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:58.184979 kubelet[2440]: E0412 18:30:58.184947 2440 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:30:58.185069 kubelet[2440]: E0412 18:30:58.185044 2440 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60"} Apr 12 18:30:58.185101 kubelet[2440]: E0412 18:30:58.185096 2440 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b8b1d27e-d077-4785-90cf-dbf172c7c41a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:30:58.185157 kubelet[2440]: E0412 18:30:58.185125 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b8b1d27e-d077-4785-90cf-dbf172c7c41a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-89kmr" podUID="b8b1d27e-d077-4785-90cf-dbf172c7c41a" Apr 12 18:30:58.190833 env[1313]: time="2024-04-12T18:30:58.190759764Z" level=error msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" failed" error="failed to destroy network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:58.191147 kubelet[2440]: E0412 18:30:58.191116 2440 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:30:58.191230 kubelet[2440]: E0412 18:30:58.191176 2440 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c"} Apr 12 18:30:58.191262 kubelet[2440]: E0412 18:30:58.191222 2440 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:30:58.191312 kubelet[2440]: E0412 18:30:58.191268 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"446d9dbf-1c3e-4466-84cf-c06af2e69bd9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-n4pzt" podUID="446d9dbf-1c3e-4466-84cf-c06af2e69bd9" Apr 12 18:30:58.199306 env[1313]: time="2024-04-12T18:30:58.199246089Z" level=error msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" failed" error="failed to destroy network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:58.199736 kubelet[2440]: E0412 18:30:58.199701 2440 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:30:58.199821 kubelet[2440]: E0412 18:30:58.199760 2440 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b"} Apr 12 18:30:58.199821 kubelet[2440]: E0412 18:30:58.199796 2440 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8ec51e14-34ab-4b15-9aa7-a409ca77a407\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:30:58.199899 kubelet[2440]: E0412 18:30:58.199841 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8ec51e14-34ab-4b15-9aa7-a409ca77a407\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-fxbgg" podUID="8ec51e14-34ab-4b15-9aa7-a409ca77a407" Apr 12 18:30:58.209441 env[1313]: time="2024-04-12T18:30:58.209379410Z" level=error msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" failed" error="failed to destroy network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:30:58.209735 kubelet[2440]: E0412 18:30:58.209678 2440 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:30:58.209735 kubelet[2440]: E0412 18:30:58.209734 2440 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe"} Apr 12 18:30:58.209825 kubelet[2440]: E0412 18:30:58.209782 2440 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"50eb7f34-aa22-47f4-8edf-efd929da751c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:30:58.209825 kubelet[2440]: E0412 18:30:58.209811 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"50eb7f34-aa22-47f4-8edf-efd929da751c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" podUID="50eb7f34-aa22-47f4-8edf-efd929da751c" Apr 12 18:30:58.729015 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe-shm.mount: Deactivated successfully. Apr 12 18:30:58.729111 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60-shm.mount: Deactivated successfully. Apr 12 18:30:58.729178 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c-shm.mount: Deactivated successfully. Apr 12 18:31:04.460626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount290884396.mount: Deactivated successfully. Apr 12 18:31:05.012551 env[1313]: time="2024-04-12T18:31:05.012476110Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:05.023065 env[1313]: time="2024-04-12T18:31:05.023028688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:05.028138 env[1313]: time="2024-04-12T18:31:05.028101327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:05.036308 env[1313]: time="2024-04-12T18:31:05.036256139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:05.036965 env[1313]: time="2024-04-12T18:31:05.036932227Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:31:05.051016 env[1313]: time="2024-04-12T18:31:05.050974798Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:31:05.102015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2418997290.mount: Deactivated successfully. Apr 12 18:31:05.120151 env[1313]: time="2024-04-12T18:31:05.120097590Z" level=info msg="CreateContainer within sandbox \"fe6b5a0b0e1dd27e5686c654d422dd752a27526400a58716991e48b623394ed6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b\"" Apr 12 18:31:05.122485 env[1313]: time="2024-04-12T18:31:05.121890705Z" level=info msg="StartContainer for \"d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b\"" Apr 12 18:31:05.138709 systemd[1]: Started cri-containerd-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b.scope. Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.164785 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:31:05.164913 kernel: audit: type=1400 audit(1712946665.158:1146): avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2880 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.208874 kernel: audit: type=1300 audit(1712946665.158:1146): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2880 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616230633530616263626266323037633866626430353062326537 Apr 12 18:31:05.233106 kernel: audit: type=1327 audit(1712946665.158:1146): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616230633530616263626266323037633866626430353062326537 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.251077 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.268946 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.286730 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.304128 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.304266 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.338859 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.356167 kernel: audit: type=1400 audit(1712946665.158:1147): avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.356761 env[1313]: time="2024-04-12T18:31:05.356681375Z" level=info msg="StartContainer for \"d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b\" returns successfully" Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.158000 audit: BPF prog-id=146 op=LOAD Apr 12 18:31:05.158000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2880 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616230633530616263626266323037633866626430353062326537 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit: BPF prog-id=147 op=LOAD Apr 12 18:31:05.159000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2880 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616230633530616263626266323037633866626430353062326537 Apr 12 18:31:05.159000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:31:05.159000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { perfmon } for pid=3378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit[3378]: AVC avc: denied { bpf } for pid=3378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:05.159000 audit: BPF prog-id=148 op=LOAD Apr 12 18:31:05.159000 audit[3378]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2880 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616230633530616263626266323037633866626430353062326537 Apr 12 18:31:05.479022 kubelet[2440]: I0412 18:31:05.478076 2440 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:31:05.503000 audit[3411]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=3411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:05.503000 audit[3411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff5c18d10 a2=0 a3=1 items=0 ppid=2619 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:05.508000 audit[3411]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:05.508000 audit[3411]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=fffff5c18d10 a2=0 a3=1 items=0 ppid=2619 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:05.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:05.749708 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:31:05.749852 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:31:06.181492 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.6MjaXB.mount: Deactivated successfully. Apr 12 18:31:06.189859 kubelet[2440]: I0412 18:31:06.189797 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gr54h" podStartSLOduration=2.252142021 podCreationTimestamp="2024-04-12 18:30:44 +0000 UTC" firstStartedPulling="2024-04-12 18:30:45.099608406 +0000 UTC m=+22.238690847" lastFinishedPulling="2024-04-12 18:31:05.037220693 +0000 UTC m=+42.176303134" observedRunningTime="2024-04-12 18:31:06.186975759 +0000 UTC m=+43.326058200" watchObservedRunningTime="2024-04-12 18:31:06.189754308 +0000 UTC m=+43.328836749" Apr 12 18:31:07.134000 audit[3514]: AVC avc: denied { write } for pid=3514 comm="tee" name="fd" dev="proc" ino=24862 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.134000 audit[3514]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeb20d961 a2=241 a3=1b6 items=1 ppid=3473 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.134000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:31:07.134000 audit: PATH item=0 name="/dev/fd/63" inode=24845 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.136000 audit[3520]: AVC avc: denied { write } for pid=3520 comm="tee" name="fd" dev="proc" ino=24866 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.136000 audit[3520]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9879973 a2=241 a3=1b6 items=1 ppid=3465 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.136000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:31:07.136000 audit: PATH item=0 name="/dev/fd/63" inode=24856 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.136000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.137000 audit[3517]: AVC avc: denied { write } for pid=3517 comm="tee" name="fd" dev="proc" ino=24870 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.137000 audit[3517]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0dae971 a2=241 a3=1b6 items=1 ppid=3472 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.137000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:31:07.137000 audit: PATH item=0 name="/dev/fd/63" inode=24850 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.138000 audit[3522]: AVC avc: denied { write } for pid=3522 comm="tee" name="fd" dev="proc" ino=24874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.138000 audit[3522]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff57a972 a2=241 a3=1b6 items=1 ppid=3469 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.138000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:31:07.138000 audit: PATH item=0 name="/dev/fd/63" inode=24170 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.138000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.142000 audit[3529]: AVC avc: denied { write } for pid=3529 comm="tee" name="fd" dev="proc" ino=24881 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.142000 audit[3529]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6edc971 a2=241 a3=1b6 items=1 ppid=3464 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.142000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:31:07.142000 audit: PATH item=0 name="/dev/fd/63" inode=24171 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.142000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.163000 audit[3530]: AVC avc: denied { write } for pid=3530 comm="tee" name="fd" dev="proc" ino=24175 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.163000 audit[3530]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff41de962 a2=241 a3=1b6 items=1 ppid=3479 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.163000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:31:07.163000 audit: PATH item=0 name="/dev/fd/63" inode=24861 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.163000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.204000 audit[3535]: AVC avc: denied { write } for pid=3535 comm="tee" name="fd" dev="proc" ino=24190 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:31:07.204000 audit[3535]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0da1971 a2=241 a3=1b6 items=1 ppid=3468 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.204000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:31:07.204000 audit: PATH item=0 name="/dev/fd/63" inode=24172 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:07.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit: BPF prog-id=149 op=LOAD Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc64552c8 a2=70 a3=ffffc6455338 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit: BPF prog-id=150 op=LOAD Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc64552c8 a2=70 a3=4b243c items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc6455280 a2=70 a3=ffffc64552f0 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit: BPF prog-id=151 op=LOAD Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc6455268 a2=70 a3=ffffc64552d8 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6455338 a2=70 a3=0 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6455328 a2=70 a3=0 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.597000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.597000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6455298 a2=70 a3=0 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.597000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc6455370 a2=70 a3=36d619ef items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc6455370 a2=70 a3=36d619ef items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.598000 audit: BPF prog-id=152 op=LOAD Apr 12 18:31:07.598000 audit[3622]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc6455298 a2=70 a3=36d61a09 items=0 ppid=3476 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.598000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:31:07.604000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.604000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc04ccd88 a2=70 a3=ffffc04ccdf8 items=0 ppid=3476 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.604000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:31:07.604000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:07.604000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc04ccc58 a2=70 a3=ffffc04cccc8 items=0 ppid=3476 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.604000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:31:07.618000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:31:07.886000 audit[3647]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:07.886000 audit[3647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc4fddbc0 a2=0 a3=ffffb1050fa8 items=0 ppid=3476 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:07.934000 audit[3649]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3649 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:07.934000 audit[3649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffeea13f0 a2=0 a3=ffffa7f6dfa8 items=0 ppid=3476 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.934000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:07.938000 audit[3650]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:07.938000 audit[3650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd884d7b0 a2=0 a3=ffff896c6fa8 items=0 ppid=3476 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.938000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:07.954000 audit[3648]: NETFILTER_CFG table=raw:103 family=2 entries=19 op=nft_register_chain pid=3648 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:07.954000 audit[3648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffda2bbef0 a2=0 a3=ffff9fb08fa8 items=0 ppid=3476 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:07.954000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:08.461324 systemd-networkd[1458]: vxlan.calico: Link UP Apr 12 18:31:08.461334 systemd-networkd[1458]: vxlan.calico: Gained carrier Apr 12 18:31:09.905701 systemd-networkd[1458]: vxlan.calico: Gained IPv6LL Apr 12 18:31:09.995197 env[1313]: time="2024-04-12T18:31:09.994852982Z" level=info msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.045 [INFO][3678] k8s.go 585: Cleaning up netns ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.045 [INFO][3678] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" iface="eth0" netns="/var/run/netns/cni-70027baa-6c07-f86a-5442-eb1052ba2396" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.048 [INFO][3678] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" iface="eth0" netns="/var/run/netns/cni-70027baa-6c07-f86a-5442-eb1052ba2396" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.049 [INFO][3678] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" iface="eth0" netns="/var/run/netns/cni-70027baa-6c07-f86a-5442-eb1052ba2396" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.049 [INFO][3678] k8s.go 592: Releasing IP address(es) ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.049 [INFO][3678] utils.go 188: Calico CNI releasing IP address ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.074 [INFO][3684] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.074 [INFO][3684] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.074 [INFO][3684] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.083 [WARNING][3684] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.083 [INFO][3684] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.085 [INFO][3684] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:10.088685 env[1313]: 2024-04-12 18:31:10.086 [INFO][3678] k8s.go 598: Teardown processing complete. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:10.091172 systemd[1]: run-netns-cni\x2d70027baa\x2d6c07\x2df86a\x2d5442\x2deb1052ba2396.mount: Deactivated successfully. Apr 12 18:31:10.092065 env[1313]: time="2024-04-12T18:31:10.092021486Z" level=info msg="TearDown network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" successfully" Apr 12 18:31:10.092155 env[1313]: time="2024-04-12T18:31:10.092139041Z" level=info msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" returns successfully" Apr 12 18:31:10.093065 env[1313]: time="2024-04-12T18:31:10.093032960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-89kmr,Uid:b8b1d27e-d077-4785-90cf-dbf172c7c41a,Namespace:kube-system,Attempt:1,}" Apr 12 18:31:10.314723 systemd-networkd[1458]: cali8e5262db7c6: Link UP Apr 12 18:31:10.328417 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:10.328559 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8e5262db7c6: link becomes ready Apr 12 18:31:10.330713 systemd-networkd[1458]: cali8e5262db7c6: Gained carrier Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.236 [INFO][3690] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0 coredns-5dd5756b68- kube-system b8b1d27e-d077-4785-90cf-dbf172c7c41a 669 0 2024-04-12 18:30:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c coredns-5dd5756b68-89kmr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8e5262db7c6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.236 [INFO][3690] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.265 [INFO][3703] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" HandleID="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.278 [INFO][3703] ipam_plugin.go 268: Auto assigning IP ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" HandleID="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003146d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-2842bd657c", "pod":"coredns-5dd5756b68-89kmr", "timestamp":"2024-04-12 18:31:10.265818872 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.278 [INFO][3703] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.278 [INFO][3703] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.278 [INFO][3703] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.280 [INFO][3703] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.284 [INFO][3703] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.288 [INFO][3703] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.290 [INFO][3703] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.292 [INFO][3703] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.292 [INFO][3703] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.294 [INFO][3703] ipam.go 1682: Creating new handle: k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162 Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.298 [INFO][3703] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.303 [INFO][3703] ipam.go 1216: Successfully claimed IPs: [192.168.64.1/26] block=192.168.64.0/26 handle="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.303 [INFO][3703] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.1/26] handle="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.303 [INFO][3703] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:10.344174 env[1313]: 2024-04-12 18:31:10.304 [INFO][3703] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.1/26] IPv6=[] ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" HandleID="k8s-pod-network.0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.306 [INFO][3690] k8s.go 385: Populated endpoint ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b8b1d27e-d077-4785-90cf-dbf172c7c41a", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"coredns-5dd5756b68-89kmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e5262db7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.307 [INFO][3690] k8s.go 386: Calico CNI using IPs: [192.168.64.1/32] ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.307 [INFO][3690] dataplane_linux.go 68: Setting the host side veth name to cali8e5262db7c6 ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.330 [INFO][3690] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.331 [INFO][3690] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b8b1d27e-d077-4785-90cf-dbf172c7c41a", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162", Pod:"coredns-5dd5756b68-89kmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e5262db7c6", MAC:"5a:26:94:2f:73:96", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:10.344805 env[1313]: 2024-04-12 18:31:10.341 [INFO][3690] k8s.go 498: Wrote updated endpoint to datastore ContainerID="0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162" Namespace="kube-system" Pod="coredns-5dd5756b68-89kmr" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:10.368110 env[1313]: time="2024-04-12T18:31:10.366426502Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:10.368110 env[1313]: time="2024-04-12T18:31:10.366479499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:10.368110 env[1313]: time="2024-04-12T18:31:10.366489699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:10.368110 env[1313]: time="2024-04-12T18:31:10.366631972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162 pid=3731 runtime=io.containerd.runc.v2 Apr 12 18:31:10.388468 systemd[1]: Started cri-containerd-0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162.scope. Apr 12 18:31:10.405061 kernel: kauditd_printk_skb: 163 callbacks suppressed Apr 12 18:31:10.405240 kernel: audit: type=1325 audit(1712946670.397:1181): table=filter:104 family=2 entries=36 op=nft_register_chain pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:10.397000 audit[3752]: NETFILTER_CFG table=filter:104 family=2 entries=36 op=nft_register_chain pid=3752 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:10.397000 audit[3752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=fffff2c79e90 a2=0 a3=ffff8a9d1fa8 items=0 ppid=3476 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.450491 kernel: audit: type=1300 audit(1712946670.397:1181): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=fffff2c79e90 a2=0 a3=ffff8a9d1fa8 items=0 ppid=3476 pid=3752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.397000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:10.469626 kernel: audit: type=1327 audit(1712946670.397:1181): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.487257 kernel: audit: type=1400 audit(1712946670.452:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.487379 kernel: audit: type=1400 audit(1712946670.452:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.521850 kernel: audit: type=1400 audit(1712946670.452:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.539589 kernel: audit: type=1400 audit(1712946670.452:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.557260 kernel: audit: type=1400 audit(1712946670.452:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.557949 kernel: audit: type=1400 audit(1712946670.452:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.592030 kernel: audit: type=1400 audit(1712946670.452:1188): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.452000 audit: BPF prog-id=153 op=LOAD Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065653065343961343165613039336437383035373430386136363963 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065653065343961343165613039336437383035373430386136363963 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.469000 audit: BPF prog-id=154 op=LOAD Apr 12 18:31:10.469000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065653065343961343165613039336437383035373430386136363963 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.486000 audit: BPF prog-id=155 op=LOAD Apr 12 18:31:10.486000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065653065343961343165613039336437383035373430386136363963 Apr 12 18:31:10.504000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:31:10.504000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.504000 audit: BPF prog-id=156 op=LOAD Apr 12 18:31:10.504000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3731 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065653065343961343165613039336437383035373430386136363963 Apr 12 18:31:10.607157 env[1313]: time="2024-04-12T18:31:10.607108289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-89kmr,Uid:b8b1d27e-d077-4785-90cf-dbf172c7c41a,Namespace:kube-system,Attempt:1,} returns sandbox id \"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162\"" Apr 12 18:31:10.612772 env[1313]: time="2024-04-12T18:31:10.612723234Z" level=info msg="CreateContainer within sandbox \"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:31:10.662416 env[1313]: time="2024-04-12T18:31:10.662366139Z" level=info msg="CreateContainer within sandbox \"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"463e7cd476eb3152b66f8f23da56361b331f2afbde101f58e6cb2096a78a15a3\"" Apr 12 18:31:10.663769 env[1313]: time="2024-04-12T18:31:10.663732477Z" level=info msg="StartContainer for \"463e7cd476eb3152b66f8f23da56361b331f2afbde101f58e6cb2096a78a15a3\"" Apr 12 18:31:10.680969 systemd[1]: Started cri-containerd-463e7cd476eb3152b66f8f23da56361b331f2afbde101f58e6cb2096a78a15a3.scope. Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.697000 audit: BPF prog-id=157 op=LOAD Apr 12 18:31:10.697000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.697000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3731 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436336537636434373665623331353262363666386632336461353633 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3731 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436336537636434373665623331353262363666386632336461353633 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.698000 audit: BPF prog-id=158 op=LOAD Apr 12 18:31:10.698000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3731 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436336537636434373665623331353262363666386632336461353633 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.699000 audit: BPF prog-id=159 op=LOAD Apr 12 18:31:10.699000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3731 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436336537636434373665623331353262363666386632336461353633 Apr 12 18:31:10.699000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:31:10.700000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:10.700000 audit: BPF prog-id=160 op=LOAD Apr 12 18:31:10.700000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3731 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436336537636434373665623331353262363666386632336461353633 Apr 12 18:31:10.723689 env[1313]: time="2024-04-12T18:31:10.723637836Z" level=info msg="StartContainer for \"463e7cd476eb3152b66f8f23da56361b331f2afbde101f58e6cb2096a78a15a3\" returns successfully" Apr 12 18:31:10.995348 env[1313]: time="2024-04-12T18:31:10.995291336Z" level=info msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] k8s.go 585: Cleaning up netns ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" iface="eth0" netns="/var/run/netns/cni-01808b84-1cdc-bc2e-8f82-c3c961369545" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" iface="eth0" netns="/var/run/netns/cni-01808b84-1cdc-bc2e-8f82-c3c961369545" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" iface="eth0" netns="/var/run/netns/cni-01808b84-1cdc-bc2e-8f82-c3c961369545" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] k8s.go 592: Releasing IP address(es) ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.041 [INFO][3819] utils.go 188: Calico CNI releasing IP address ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.071 [INFO][3825] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.071 [INFO][3825] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.071 [INFO][3825] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.082 [WARNING][3825] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.083 [INFO][3825] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.084 [INFO][3825] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:11.087555 env[1313]: 2024-04-12 18:31:11.086 [INFO][3819] k8s.go 598: Teardown processing complete. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:11.088033 env[1313]: time="2024-04-12T18:31:11.087747410Z" level=info msg="TearDown network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" successfully" Apr 12 18:31:11.088033 env[1313]: time="2024-04-12T18:31:11.087809248Z" level=info msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" returns successfully" Apr 12 18:31:11.088840 env[1313]: time="2024-04-12T18:31:11.088805643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f9469bc77-7twzn,Uid:50eb7f34-aa22-47f4-8edf-efd929da751c,Namespace:calico-system,Attempt:1,}" Apr 12 18:31:11.091954 systemd[1]: run-containerd-runc-k8s.io-0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162-runc.MJyRui.mount: Deactivated successfully. Apr 12 18:31:11.092046 systemd[1]: run-netns-cni\x2d01808b84\x2d1cdc\x2dbc2e\x2d8f82\x2dc3c961369545.mount: Deactivated successfully. Apr 12 18:31:11.190543 kubelet[2440]: I0412 18:31:11.186020 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-89kmr" podStartSLOduration=33.184982152 podCreationTimestamp="2024-04-12 18:30:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:31:11.184857197 +0000 UTC m=+48.323939638" watchObservedRunningTime="2024-04-12 18:31:11.184982152 +0000 UTC m=+48.324064593" Apr 12 18:31:11.231000 audit[3843]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:11.231000 audit[3843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcc16ba20 a2=0 a3=1 items=0 ppid=2619 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:11.232000 audit[3843]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:11.232000 audit[3843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcc16ba20 a2=0 a3=1 items=0 ppid=2619 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:11.247000 audit[3849]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=3849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:11.247000 audit[3849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe75e2230 a2=0 a3=1 items=0 ppid=2619 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:11.250000 audit[3849]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=3849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:11.250000 audit[3849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffe75e2230 a2=0 a3=1 items=0 ppid=2619 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:11.297947 systemd-networkd[1458]: calie44041ec2e3: Link UP Apr 12 18:31:11.306323 systemd-networkd[1458]: calie44041ec2e3: Gained carrier Apr 12 18:31:11.306687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie44041ec2e3: link becomes ready Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.209 [INFO][3832] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0 calico-kube-controllers-5f9469bc77- calico-system 50eb7f34-aa22-47f4-8edf-efd929da751c 678 0 2024-04-12 18:30:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5f9469bc77 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c calico-kube-controllers-5f9469bc77-7twzn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie44041ec2e3 [] []}} ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.209 [INFO][3832] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.250 [INFO][3844] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" HandleID="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.263 [INFO][3844] ipam_plugin.go 268: Auto assigning IP ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" HandleID="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef590), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-2842bd657c", "pod":"calico-kube-controllers-5f9469bc77-7twzn", "timestamp":"2024-04-12 18:31:11.250434764 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.263 [INFO][3844] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.263 [INFO][3844] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.263 [INFO][3844] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.265 [INFO][3844] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.269 [INFO][3844] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.273 [INFO][3844] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.275 [INFO][3844] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.278 [INFO][3844] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.278 [INFO][3844] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.280 [INFO][3844] ipam.go 1682: Creating new handle: k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179 Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.287 [INFO][3844] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.292 [INFO][3844] ipam.go 1216: Successfully claimed IPs: [192.168.64.2/26] block=192.168.64.0/26 handle="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.292 [INFO][3844] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.2/26] handle="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.292 [INFO][3844] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:11.340492 env[1313]: 2024-04-12 18:31:11.292 [INFO][3844] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.2/26] IPv6=[] ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" HandleID="k8s-pod-network.6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.294 [INFO][3832] k8s.go 385: Populated endpoint ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0", GenerateName:"calico-kube-controllers-5f9469bc77-", Namespace:"calico-system", SelfLink:"", UID:"50eb7f34-aa22-47f4-8edf-efd929da751c", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f9469bc77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"calico-kube-controllers-5f9469bc77-7twzn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie44041ec2e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.294 [INFO][3832] k8s.go 386: Calico CNI using IPs: [192.168.64.2/32] ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.294 [INFO][3832] dataplane_linux.go 68: Setting the host side veth name to calie44041ec2e3 ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.307 [INFO][3832] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.314 [INFO][3832] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0", GenerateName:"calico-kube-controllers-5f9469bc77-", Namespace:"calico-system", SelfLink:"", UID:"50eb7f34-aa22-47f4-8edf-efd929da751c", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f9469bc77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179", Pod:"calico-kube-controllers-5f9469bc77-7twzn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie44041ec2e3", MAC:"52:9a:c6:bd:25:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:11.341088 env[1313]: 2024-04-12 18:31:11.338 [INFO][3832] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179" Namespace="calico-system" Pod="calico-kube-controllers-5f9469bc77-7twzn" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:11.364558 env[1313]: time="2024-04-12T18:31:11.364443430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:11.364558 env[1313]: time="2024-04-12T18:31:11.364485828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:11.364558 env[1313]: time="2024-04-12T18:31:11.364496227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:11.364889 env[1313]: time="2024-04-12T18:31:11.364645221Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179 pid=3873 runtime=io.containerd.runc.v2 Apr 12 18:31:11.391750 systemd[1]: Started cri-containerd-6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179.scope. Apr 12 18:31:11.469000 audit[3904]: NETFILTER_CFG table=filter:109 family=2 entries=40 op=nft_register_chain pid=3904 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:11.469000 audit[3904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffd8f3e7d0 a2=0 a3=ffffbb66afa8 items=0 ppid=3476 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.476000 audit: BPF prog-id=161 op=LOAD Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3873 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665336639343366356164396533623661643236326162363762326566 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3873 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665336639343366356164396533623661643236326162363762326566 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit: BPF prog-id=162 op=LOAD Apr 12 18:31:11.477000 audit[3884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3873 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665336639343366356164396533623661643236326162363762326566 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit: BPF prog-id=163 op=LOAD Apr 12 18:31:11.477000 audit[3884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3873 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665336639343366356164396533623661643236326162363762326566 Apr 12 18:31:11.477000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:31:11.477000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:11.477000 audit: BPF prog-id=164 op=LOAD Apr 12 18:31:11.477000 audit[3884]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3873 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665336639343366356164396533623661643236326162363762326566 Apr 12 18:31:11.499940 env[1313]: time="2024-04-12T18:31:11.499827493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f9469bc77-7twzn,Uid:50eb7f34-aa22-47f4-8edf-efd929da751c,Namespace:calico-system,Attempt:1,} returns sandbox id \"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179\"" Apr 12 18:31:11.503808 env[1313]: time="2024-04-12T18:31:11.503742277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:31:11.762257 systemd-networkd[1458]: cali8e5262db7c6: Gained IPv6LL Apr 12 18:31:11.994427 env[1313]: time="2024-04-12T18:31:11.994386581Z" level=info msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] k8s.go 585: Cleaning up netns ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" iface="eth0" netns="/var/run/netns/cni-f90cea75-cf17-fbd6-b707-ea77e8d656dd" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" iface="eth0" netns="/var/run/netns/cni-f90cea75-cf17-fbd6-b707-ea77e8d656dd" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" iface="eth0" netns="/var/run/netns/cni-f90cea75-cf17-fbd6-b707-ea77e8d656dd" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] k8s.go 592: Releasing IP address(es) ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.042 [INFO][3924] utils.go 188: Calico CNI releasing IP address ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.061 [INFO][3932] ipam_plugin.go 415: Releasing address using handleID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.062 [INFO][3932] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.062 [INFO][3932] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.070 [WARNING][3932] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.070 [INFO][3932] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.072 [INFO][3932] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:12.074938 env[1313]: 2024-04-12 18:31:12.073 [INFO][3924] k8s.go 598: Teardown processing complete. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:12.075909 env[1313]: time="2024-04-12T18:31:12.075860661Z" level=info msg="TearDown network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" successfully" Apr 12 18:31:12.076002 env[1313]: time="2024-04-12T18:31:12.075984615Z" level=info msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" returns successfully" Apr 12 18:31:12.076751 env[1313]: time="2024-04-12T18:31:12.076722062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fxbgg,Uid:8ec51e14-34ab-4b15-9aa7-a409ca77a407,Namespace:kube-system,Attempt:1,}" Apr 12 18:31:12.091301 systemd[1]: run-containerd-runc-k8s.io-6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179-runc.9cAH0e.mount: Deactivated successfully. Apr 12 18:31:12.091415 systemd[1]: run-netns-cni\x2df90cea75\x2dcf17\x2dfbd6\x2db707\x2dea77e8d656dd.mount: Deactivated successfully. Apr 12 18:31:12.237393 systemd-networkd[1458]: calib99a2504d71: Link UP Apr 12 18:31:12.254139 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:12.254272 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib99a2504d71: link becomes ready Apr 12 18:31:12.255320 systemd-networkd[1458]: calib99a2504d71: Gained carrier Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.157 [INFO][3939] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0 coredns-5dd5756b68- kube-system 8ec51e14-34ab-4b15-9aa7-a409ca77a407 696 0 2024-04-12 18:30:38 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c coredns-5dd5756b68-fxbgg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib99a2504d71 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.157 [INFO][3939] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.192 [INFO][3949] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" HandleID="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.204 [INFO][3949] ipam_plugin.go 268: Auto assigning IP ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" HandleID="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263670), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-2842bd657c", "pod":"coredns-5dd5756b68-fxbgg", "timestamp":"2024-04-12 18:31:12.192195106 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.204 [INFO][3949] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.204 [INFO][3949] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.204 [INFO][3949] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.206 [INFO][3949] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.210 [INFO][3949] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.214 [INFO][3949] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.216 [INFO][3949] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.221 [INFO][3949] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.221 [INFO][3949] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.223 [INFO][3949] ipam.go 1682: Creating new handle: k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.227 [INFO][3949] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.233 [INFO][3949] ipam.go 1216: Successfully claimed IPs: [192.168.64.3/26] block=192.168.64.0/26 handle="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.233 [INFO][3949] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.3/26] handle="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.233 [INFO][3949] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:12.272192 env[1313]: 2024-04-12 18:31:12.233 [INFO][3949] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.3/26] IPv6=[] ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" HandleID="k8s-pod-network.db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.235 [INFO][3939] k8s.go 385: Populated endpoint ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8ec51e14-34ab-4b15-9aa7-a409ca77a407", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"coredns-5dd5756b68-fxbgg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib99a2504d71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.235 [INFO][3939] k8s.go 386: Calico CNI using IPs: [192.168.64.3/32] ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.235 [INFO][3939] dataplane_linux.go 68: Setting the host side veth name to calib99a2504d71 ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.254 [INFO][3939] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.256 [INFO][3939] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8ec51e14-34ab-4b15-9aa7-a409ca77a407", ResourceVersion:"696", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b", Pod:"coredns-5dd5756b68-fxbgg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib99a2504d71", MAC:"fa:0f:64:d3:19:8b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:12.272842 env[1313]: 2024-04-12 18:31:12.269 [INFO][3939] k8s.go 498: Wrote updated endpoint to datastore ContainerID="db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b" Namespace="kube-system" Pod="coredns-5dd5756b68-fxbgg" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:12.289000 audit[3967]: NETFILTER_CFG table=filter:110 family=2 entries=34 op=nft_register_chain pid=3967 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:12.289000 audit[3967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18220 a0=3 a1=ffffc0f33df0 a2=0 a3=ffffae303fa8 items=0 ppid=3476 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:12.320134 env[1313]: time="2024-04-12T18:31:12.320060796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:12.320291 env[1313]: time="2024-04-12T18:31:12.320149192Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:12.320291 env[1313]: time="2024-04-12T18:31:12.320178911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:12.320470 env[1313]: time="2024-04-12T18:31:12.320431579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b pid=3977 runtime=io.containerd.runc.v2 Apr 12 18:31:12.334865 systemd[1]: Started cri-containerd-db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b.scope. Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit: BPF prog-id=165 op=LOAD Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3977 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336264333836653035663830363937333463363462303734383930 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3977 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336264333836653035663830363937333463363462303734383930 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit: BPF prog-id=166 op=LOAD Apr 12 18:31:12.355000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3977 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336264333836653035663830363937333463363462303734383930 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit: BPF prog-id=167 op=LOAD Apr 12 18:31:12.355000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3977 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336264333836653035663830363937333463363462303734383930 Apr 12 18:31:12.355000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:31:12.355000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { perfmon } for pid=3986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit[3986]: AVC avc: denied { bpf } for pid=3986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.355000 audit: BPF prog-id=168 op=LOAD Apr 12 18:31:12.355000 audit[3986]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3977 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336264333836653035663830363937333463363462303734383930 Apr 12 18:31:12.378018 env[1313]: time="2024-04-12T18:31:12.377973730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-fxbgg,Uid:8ec51e14-34ab-4b15-9aa7-a409ca77a407,Namespace:kube-system,Attempt:1,} returns sandbox id \"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b\"" Apr 12 18:31:12.382119 env[1313]: time="2024-04-12T18:31:12.382075147Z" level=info msg="CreateContainer within sandbox \"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:31:12.401616 systemd-networkd[1458]: calie44041ec2e3: Gained IPv6LL Apr 12 18:31:12.425623 env[1313]: time="2024-04-12T18:31:12.425570844Z" level=info msg="CreateContainer within sandbox \"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8e75fd5ae3bc35016088a915a925131a882441857a1583a5025e854354cfedf2\"" Apr 12 18:31:12.427991 env[1313]: time="2024-04-12T18:31:12.426626637Z" level=info msg="StartContainer for \"8e75fd5ae3bc35016088a915a925131a882441857a1583a5025e854354cfedf2\"" Apr 12 18:31:12.442924 systemd[1]: Started cri-containerd-8e75fd5ae3bc35016088a915a925131a882441857a1583a5025e854354cfedf2.scope. Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit: BPF prog-id=169 op=LOAD Apr 12 18:31:12.460000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.460000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3977 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373566643561653362633335303136303838613931356139323531 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3977 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373566643561653362633335303136303838613931356139323531 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.461000 audit: BPF prog-id=170 op=LOAD Apr 12 18:31:12.461000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3977 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373566643561653362633335303136303838613931356139323531 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.462000 audit: BPF prog-id=171 op=LOAD Apr 12 18:31:12.462000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3977 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373566643561653362633335303136303838613931356139323531 Apr 12 18:31:12.462000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:31:12.462000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:12.463000 audit: BPF prog-id=172 op=LOAD Apr 12 18:31:12.463000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3977 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:12.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865373566643561653362633335303136303838613931356139323531 Apr 12 18:31:12.483913 env[1313]: time="2024-04-12T18:31:12.483864001Z" level=info msg="StartContainer for \"8e75fd5ae3bc35016088a915a925131a882441857a1583a5025e854354cfedf2\" returns successfully" Apr 12 18:31:12.995957 env[1313]: time="2024-04-12T18:31:12.995906456Z" level=info msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] k8s.go 585: Cleaning up netns ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" iface="eth0" netns="/var/run/netns/cni-a3112b54-ebec-3ce4-098f-e86b2a98d1fa" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" iface="eth0" netns="/var/run/netns/cni-a3112b54-ebec-3ce4-098f-e86b2a98d1fa" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" iface="eth0" netns="/var/run/netns/cni-a3112b54-ebec-3ce4-098f-e86b2a98d1fa" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] k8s.go 592: Releasing IP address(es) ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.049 [INFO][4068] utils.go 188: Calico CNI releasing IP address ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.076 [INFO][4074] ipam_plugin.go 415: Releasing address using handleID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.076 [INFO][4074] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.076 [INFO][4074] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.094 [WARNING][4074] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.094 [INFO][4074] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.096 [INFO][4074] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:13.099366 env[1313]: 2024-04-12 18:31:13.097 [INFO][4068] k8s.go 598: Teardown processing complete. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:13.101471 systemd[1]: run-netns-cni\x2da3112b54\x2debec\x2d3ce4\x2d098f\x2de86b2a98d1fa.mount: Deactivated successfully. Apr 12 18:31:13.105759 env[1313]: time="2024-04-12T18:31:13.105680753Z" level=info msg="TearDown network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" successfully" Apr 12 18:31:13.105929 env[1313]: time="2024-04-12T18:31:13.105908663Z" level=info msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" returns successfully" Apr 12 18:31:13.108406 env[1313]: time="2024-04-12T18:31:13.108346715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n4pzt,Uid:446d9dbf-1c3e-4466-84cf-c06af2e69bd9,Namespace:calico-system,Attempt:1,}" Apr 12 18:31:13.226000 audit[4094]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:13.226000 audit[4094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffeee81eb0 a2=0 a3=1 items=0 ppid=2619 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:13.233107 kubelet[2440]: I0412 18:31:13.232917 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-fxbgg" podStartSLOduration=35.23286884 podCreationTimestamp="2024-04-12 18:30:38 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:31:13.207331571 +0000 UTC m=+50.346414012" watchObservedRunningTime="2024-04-12 18:31:13.23286884 +0000 UTC m=+50.371951281" Apr 12 18:31:13.230000 audit[4094]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:13.230000 audit[4094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffeee81eb0 a2=0 a3=1 items=0 ppid=2619 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:13.275000 audit[4100]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:13.275000 audit[4100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4a3f240 a2=0 a3=1 items=0 ppid=2619 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:13.282000 audit[4100]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:13.282000 audit[4100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe4a3f240 a2=0 a3=1 items=0 ppid=2619 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:13.339437 systemd-networkd[1458]: cali23ede21d2c0: Link UP Apr 12 18:31:13.356061 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:13.356198 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali23ede21d2c0: link becomes ready Apr 12 18:31:13.357858 systemd-networkd[1458]: cali23ede21d2c0: Gained carrier Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.239 [INFO][4081] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0 csi-node-driver- calico-system 446d9dbf-1c3e-4466-84cf-c06af2e69bd9 705 0 2024-04-12 18:30:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c csi-node-driver-n4pzt eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali23ede21d2c0 [] []}} ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.239 [INFO][4081] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.291 [INFO][4096] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" HandleID="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.304 [INFO][4096] ipam_plugin.go 268: Auto assigning IP ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" HandleID="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d180), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-2842bd657c", "pod":"csi-node-driver-n4pzt", "timestamp":"2024-04-12 18:31:13.291377888 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.304 [INFO][4096] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.304 [INFO][4096] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.304 [INFO][4096] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.306 [INFO][4096] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.311 [INFO][4096] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.315 [INFO][4096] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.318 [INFO][4096] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.321 [INFO][4096] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.321 [INFO][4096] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.323 [INFO][4096] ipam.go 1682: Creating new handle: k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045 Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.328 [INFO][4096] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.333 [INFO][4096] ipam.go 1216: Successfully claimed IPs: [192.168.64.4/26] block=192.168.64.0/26 handle="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.333 [INFO][4096] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.4/26] handle="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.334 [INFO][4096] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:13.381348 env[1313]: 2024-04-12 18:31:13.334 [INFO][4096] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.4/26] IPv6=[] ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" HandleID="k8s-pod-network.950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.335 [INFO][4081] k8s.go 385: Populated endpoint ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"446d9dbf-1c3e-4466-84cf-c06af2e69bd9", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"csi-node-driver-n4pzt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali23ede21d2c0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.336 [INFO][4081] k8s.go 386: Calico CNI using IPs: [192.168.64.4/32] ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.336 [INFO][4081] dataplane_linux.go 68: Setting the host side veth name to cali23ede21d2c0 ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.358 [INFO][4081] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.358 [INFO][4081] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"446d9dbf-1c3e-4466-84cf-c06af2e69bd9", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045", Pod:"csi-node-driver-n4pzt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali23ede21d2c0", MAC:"1e:1a:b8:6d:9e:ad", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:13.382130 env[1313]: 2024-04-12 18:31:13.379 [INFO][4081] k8s.go 498: Wrote updated endpoint to datastore ContainerID="950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045" Namespace="calico-system" Pod="csi-node-driver-n4pzt" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:13.411872 env[1313]: time="2024-04-12T18:31:13.405573711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:13.411872 env[1313]: time="2024-04-12T18:31:13.405622269Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:13.411872 env[1313]: time="2024-04-12T18:31:13.405632948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:13.411872 env[1313]: time="2024-04-12T18:31:13.405759943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045 pid=4125 runtime=io.containerd.runc.v2 Apr 12 18:31:13.415000 audit[4132]: NETFILTER_CFG table=filter:115 family=2 entries=42 op=nft_register_chain pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:13.415000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffc7485cb0 a2=0 a3=ffff92a92fa8 items=0 ppid=3476 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.415000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:13.431871 systemd[1]: Started cri-containerd-950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045.scope. Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.457000 audit: BPF prog-id=173 op=LOAD Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4125 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306433323663323435383663373437616236616263343332336333 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4125 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306433323663323435383663373437616236616263343332336333 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit: BPF prog-id=174 op=LOAD Apr 12 18:31:13.458000 audit[4135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4125 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306433323663323435383663373437616236616263343332336333 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit: BPF prog-id=175 op=LOAD Apr 12 18:31:13.458000 audit[4135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4125 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306433323663323435383663373437616236616263343332336333 Apr 12 18:31:13.458000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:31:13.458000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:13.458000 audit: BPF prog-id=176 op=LOAD Apr 12 18:31:13.458000 audit[4135]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4125 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:13.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935306433323663323435383663373437616236616263343332336333 Apr 12 18:31:13.474912 env[1313]: time="2024-04-12T18:31:13.474854522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-n4pzt,Uid:446d9dbf-1c3e-4466-84cf-c06af2e69bd9,Namespace:calico-system,Attempt:1,} returns sandbox id \"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045\"" Apr 12 18:31:13.617619 systemd-networkd[1458]: calib99a2504d71: Gained IPv6LL Apr 12 18:31:15.008880 env[1313]: time="2024-04-12T18:31:15.008823186Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:15.024615 env[1313]: time="2024-04-12T18:31:15.024565700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:15.032398 env[1313]: time="2024-04-12T18:31:15.032300283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:15.040114 env[1313]: time="2024-04-12T18:31:15.039957029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:15.041665 env[1313]: time="2024-04-12T18:31:15.041165217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:31:15.043047 env[1313]: time="2024-04-12T18:31:15.043009336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:31:15.061726 env[1313]: time="2024-04-12T18:31:15.061678242Z" level=info msg="CreateContainer within sandbox \"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:31:15.121078 env[1313]: time="2024-04-12T18:31:15.121016256Z" level=info msg="CreateContainer within sandbox \"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12\"" Apr 12 18:31:15.122057 env[1313]: time="2024-04-12T18:31:15.122006453Z" level=info msg="StartContainer for \"d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12\"" Apr 12 18:31:15.156144 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.YrjTNF.mount: Deactivated successfully. Apr 12 18:31:15.162897 systemd[1]: Started cri-containerd-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12.scope. Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.178000 audit: BPF prog-id=177 op=LOAD Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3873 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:15.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373163313732316330653865306631383135313561343735656438 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3873 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:15.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373163313732316330653865306631383135313561343735656438 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.179000 audit: BPF prog-id=178 op=LOAD Apr 12 18:31:15.179000 audit[4172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3873 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:15.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373163313732316330653865306631383135313561343735656438 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit: BPF prog-id=179 op=LOAD Apr 12 18:31:15.180000 audit[4172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3873 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:15.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373163313732316330653865306631383135313561343735656438 Apr 12 18:31:15.180000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:31:15.180000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { perfmon } for pid=4172 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit[4172]: AVC avc: denied { bpf } for pid=4172 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:15.180000 audit: BPF prog-id=180 op=LOAD Apr 12 18:31:15.180000 audit[4172]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3873 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:15.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437373163313732316330653865306631383135313561343735656438 Apr 12 18:31:15.211257 env[1313]: time="2024-04-12T18:31:15.211193245Z" level=info msg="StartContainer for \"d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12\" returns successfully" Apr 12 18:31:15.409724 systemd-networkd[1458]: cali23ede21d2c0: Gained IPv6LL Apr 12 18:31:16.219464 kubelet[2440]: I0412 18:31:16.219335 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5f9469bc77-7twzn" podStartSLOduration=28.68038922 podCreationTimestamp="2024-04-12 18:30:44 +0000 UTC" firstStartedPulling="2024-04-12 18:31:11.50322442 +0000 UTC m=+48.642306861" lastFinishedPulling="2024-04-12 18:31:15.042125655 +0000 UTC m=+52.181208176" observedRunningTime="2024-04-12 18:31:16.219234418 +0000 UTC m=+53.358316859" watchObservedRunningTime="2024-04-12 18:31:16.219290535 +0000 UTC m=+53.358372976" Apr 12 18:31:16.229907 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.y3X0dl.mount: Deactivated successfully. Apr 12 18:31:16.781895 env[1313]: time="2024-04-12T18:31:16.781841042Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:16.791954 env[1313]: time="2024-04-12T18:31:16.791909646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:16.797705 env[1313]: time="2024-04-12T18:31:16.797654078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:16.803617 env[1313]: time="2024-04-12T18:31:16.803565542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:16.804788 env[1313]: time="2024-04-12T18:31:16.804308590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:31:16.807078 env[1313]: time="2024-04-12T18:31:16.807026272Z" level=info msg="CreateContainer within sandbox \"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:31:16.843149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount198243027.mount: Deactivated successfully. Apr 12 18:31:16.867652 env[1313]: time="2024-04-12T18:31:16.867595572Z" level=info msg="CreateContainer within sandbox \"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"65701be6cacbdc53bff25e455e18388b2d10f0f468b7e5ad6749db9b210a76a7\"" Apr 12 18:31:16.868641 env[1313]: time="2024-04-12T18:31:16.868609329Z" level=info msg="StartContainer for \"65701be6cacbdc53bff25e455e18388b2d10f0f468b7e5ad6749db9b210a76a7\"" Apr 12 18:31:16.889265 systemd[1]: Started cri-containerd-65701be6cacbdc53bff25e455e18388b2d10f0f468b7e5ad6749db9b210a76a7.scope. Apr 12 18:31:16.954729 kernel: kauditd_printk_skb: 425 callbacks suppressed Apr 12 18:31:16.954911 kernel: audit: type=1400 audit(1712946676.921:1319): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.954960 kernel: audit: type=1300 audit(1712946676.921:1319): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4125 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4125 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:16.995089 kernel: audit: type=1327 audit(1712946676.921:1319): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373031626536636163626463353362666632356534353565313833 Apr 12 18:31:16.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373031626536636163626463353362666632356534353565313833 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.042140 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.064386 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.083451 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.106083 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.125436 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.143390 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.143707 env[1313]: time="2024-04-12T18:31:17.143649397Z" level=info msg="StartContainer for \"65701be6cacbdc53bff25e455e18388b2d10f0f468b7e5ad6749db9b210a76a7\" returns successfully" Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.161523 kernel: audit: type=1400 audit(1712946676.921:1320): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:17.163013 env[1313]: time="2024-04-12T18:31:17.162924130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.921000 audit: BPF prog-id=181 op=LOAD Apr 12 18:31:16.921000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4125 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:16.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373031626536636163626463353362666632356534353565313833 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.926000 audit: BPF prog-id=182 op=LOAD Apr 12 18:31:16.926000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4125 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:16.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373031626536636163626463353362666632356534353565313833 Apr 12 18:31:16.953000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:31:16.953000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:16.953000 audit: BPF prog-id=183 op=LOAD Apr 12 18:31:16.953000 audit[4228]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4125 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:16.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635373031626536636163626463353362666632356534353565313833 Apr 12 18:31:18.824474 env[1313]: time="2024-04-12T18:31:18.824414335Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:18.833151 env[1313]: time="2024-04-12T18:31:18.833096245Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:18.839452 env[1313]: time="2024-04-12T18:31:18.839409735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:18.845144 env[1313]: time="2024-04-12T18:31:18.845097293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:18.845621 env[1313]: time="2024-04-12T18:31:18.845584312Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:31:18.848746 env[1313]: time="2024-04-12T18:31:18.848703339Z" level=info msg="CreateContainer within sandbox \"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:31:18.900439 env[1313]: time="2024-04-12T18:31:18.900377737Z" level=info msg="CreateContainer within sandbox \"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ce647dd03341b67cc8df04eb440a2e52f4428f5b71a7b3763a217a2370ccb48b\"" Apr 12 18:31:18.901310 env[1313]: time="2024-04-12T18:31:18.901265699Z" level=info msg="StartContainer for \"ce647dd03341b67cc8df04eb440a2e52f4428f5b71a7b3763a217a2370ccb48b\"" Apr 12 18:31:18.942975 systemd[1]: run-containerd-runc-k8s.io-ce647dd03341b67cc8df04eb440a2e52f4428f5b71a7b3763a217a2370ccb48b-runc.gllB8P.mount: Deactivated successfully. Apr 12 18:31:18.950256 systemd[1]: Started cri-containerd-ce647dd03341b67cc8df04eb440a2e52f4428f5b71a7b3763a217a2370ccb48b.scope. Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:19.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363437646430333334316236376363386466303465623434306132 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.009000 audit: BPF prog-id=184 op=LOAD Apr 12 18:31:19.009000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:19.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363437646430333334316236376363386466303465623434306132 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit: BPF prog-id=185 op=LOAD Apr 12 18:31:19.010000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:19.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363437646430333334316236376363386466303465623434306132 Apr 12 18:31:19.010000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:31:19.010000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:19.010000 audit: BPF prog-id=186 op=LOAD Apr 12 18:31:19.010000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:19.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363437646430333334316236376363386466303465623434306132 Apr 12 18:31:19.047350 env[1313]: time="2024-04-12T18:31:19.047251211Z" level=info msg="StartContainer for \"ce647dd03341b67cc8df04eb440a2e52f4428f5b71a7b3763a217a2370ccb48b\" returns successfully" Apr 12 18:31:19.115220 kubelet[2440]: I0412 18:31:19.114766 2440 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:31:19.115220 kubelet[2440]: I0412 18:31:19.114808 2440 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:31:19.223861 kubelet[2440]: I0412 18:31:19.223828 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-n4pzt" podStartSLOduration=29.853885113 podCreationTimestamp="2024-04-12 18:30:44 +0000 UTC" firstStartedPulling="2024-04-12 18:31:13.476449572 +0000 UTC m=+50.615532013" lastFinishedPulling="2024-04-12 18:31:18.84634044 +0000 UTC m=+55.985422841" observedRunningTime="2024-04-12 18:31:19.22215197 +0000 UTC m=+56.361234411" watchObservedRunningTime="2024-04-12 18:31:19.223775941 +0000 UTC m=+56.362858382" Apr 12 18:31:19.460000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.461000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.461000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400d018e10 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.460000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400b336c60 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.467000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.467000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400b336c90 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.468000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.468000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40026d6ac0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.473000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.473000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4007c8dde0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.473000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.473000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400b337110 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:31:19.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:31:19.926000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.926000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:19.926000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001425d80 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:19.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:19.926000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000df6bd0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:19.926000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:22.968141 env[1313]: time="2024-04-12T18:31:22.968092709Z" level=info msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.011 [WARNING][4318] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"446d9dbf-1c3e-4466-84cf-c06af2e69bd9", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045", Pod:"csi-node-driver-n4pzt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali23ede21d2c0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.012 [INFO][4318] k8s.go 585: Cleaning up netns ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.012 [INFO][4318] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" iface="eth0" netns="" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.012 [INFO][4318] k8s.go 592: Releasing IP address(es) ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.012 [INFO][4318] utils.go 188: Calico CNI releasing IP address ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.030 [INFO][4327] ipam_plugin.go 415: Releasing address using handleID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.030 [INFO][4327] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.030 [INFO][4327] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.039 [WARNING][4327] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.039 [INFO][4327] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.041 [INFO][4327] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.043222 env[1313]: 2024-04-12 18:31:23.042 [INFO][4318] k8s.go 598: Teardown processing complete. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.044125 env[1313]: time="2024-04-12T18:31:23.043266283Z" level=info msg="TearDown network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" successfully" Apr 12 18:31:23.044125 env[1313]: time="2024-04-12T18:31:23.043300641Z" level=info msg="StopPodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" returns successfully" Apr 12 18:31:23.044436 env[1313]: time="2024-04-12T18:31:23.044408956Z" level=info msg="RemovePodSandbox for \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" Apr 12 18:31:23.044897 env[1313]: time="2024-04-12T18:31:23.044822779Z" level=info msg="Forcibly stopping sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\"" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.080 [WARNING][4345] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"446d9dbf-1c3e-4466-84cf-c06af2e69bd9", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"950d326c24586c747ab6abc4323c30d5eebacd4ee1152f758eef25a4e227b045", Pod:"csi-node-driver-n4pzt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali23ede21d2c0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.081 [INFO][4345] k8s.go 585: Cleaning up netns ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.081 [INFO][4345] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" iface="eth0" netns="" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.081 [INFO][4345] k8s.go 592: Releasing IP address(es) ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.081 [INFO][4345] utils.go 188: Calico CNI releasing IP address ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.104 [INFO][4351] ipam_plugin.go 415: Releasing address using handleID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.104 [INFO][4351] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.104 [INFO][4351] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.113 [WARNING][4351] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.113 [INFO][4351] ipam_plugin.go 443: Releasing address using workloadID ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" HandleID="k8s-pod-network.90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Workload="ci--3510.3.3--a--2842bd657c-k8s-csi--node--driver--n4pzt-eth0" Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.115 [INFO][4351] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.123581 env[1313]: 2024-04-12 18:31:23.122 [INFO][4345] k8s.go 598: Teardown processing complete. ContainerID="90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c" Apr 12 18:31:23.124142 env[1313]: time="2024-04-12T18:31:23.124071994Z" level=info msg="TearDown network for sandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" successfully" Apr 12 18:31:23.147957 env[1313]: time="2024-04-12T18:31:23.147858334Z" level=info msg="RemovePodSandbox \"90062ddd6b93ed00c3129e14d6f1a415a11b95522368a7f264563494adebf89c\" returns successfully" Apr 12 18:31:23.148824 env[1313]: time="2024-04-12T18:31:23.148795895Z" level=info msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.183 [WARNING][4370] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0", GenerateName:"calico-kube-controllers-5f9469bc77-", Namespace:"calico-system", SelfLink:"", UID:"50eb7f34-aa22-47f4-8edf-efd929da751c", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f9469bc77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179", Pod:"calico-kube-controllers-5f9469bc77-7twzn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie44041ec2e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.184 [INFO][4370] k8s.go 585: Cleaning up netns ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.184 [INFO][4370] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" iface="eth0" netns="" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.184 [INFO][4370] k8s.go 592: Releasing IP address(es) ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.184 [INFO][4370] utils.go 188: Calico CNI releasing IP address ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.231 [INFO][4377] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.231 [INFO][4377] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.231 [INFO][4377] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.240 [WARNING][4377] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.240 [INFO][4377] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.242 [INFO][4377] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.244669 env[1313]: 2024-04-12 18:31:23.243 [INFO][4370] k8s.go 598: Teardown processing complete. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.245645 env[1313]: time="2024-04-12T18:31:23.245598867Z" level=info msg="TearDown network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" successfully" Apr 12 18:31:23.245679 env[1313]: time="2024-04-12T18:31:23.245648185Z" level=info msg="StopPodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" returns successfully" Apr 12 18:31:23.246317 env[1313]: time="2024-04-12T18:31:23.246288879Z" level=info msg="RemovePodSandbox for \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" Apr 12 18:31:23.246473 env[1313]: time="2024-04-12T18:31:23.246436033Z" level=info msg="Forcibly stopping sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\"" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.285 [WARNING][4397] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0", GenerateName:"calico-kube-controllers-5f9469bc77-", Namespace:"calico-system", SelfLink:"", UID:"50eb7f34-aa22-47f4-8edf-efd929da751c", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f9469bc77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"6e3f943f5ad9e3b6ad262ab67b2efa51ec8608101de47784ac86968f73c18179", Pod:"calico-kube-controllers-5f9469bc77-7twzn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.64.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie44041ec2e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.285 [INFO][4397] k8s.go 585: Cleaning up netns ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.285 [INFO][4397] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" iface="eth0" netns="" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.285 [INFO][4397] k8s.go 592: Releasing IP address(es) ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.285 [INFO][4397] utils.go 188: Calico CNI releasing IP address ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.313 [INFO][4404] ipam_plugin.go 415: Releasing address using handleID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.313 [INFO][4404] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.313 [INFO][4404] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.322 [WARNING][4404] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.322 [INFO][4404] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" HandleID="k8s-pod-network.7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--kube--controllers--5f9469bc77--7twzn-eth0" Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.325 [INFO][4404] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.328168 env[1313]: 2024-04-12 18:31:23.326 [INFO][4397] k8s.go 598: Teardown processing complete. ContainerID="7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe" Apr 12 18:31:23.328739 env[1313]: time="2024-04-12T18:31:23.328198304Z" level=info msg="TearDown network for sandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" successfully" Apr 12 18:31:23.341350 env[1313]: time="2024-04-12T18:31:23.341293805Z" level=info msg="RemovePodSandbox \"7d945293abdaca41a148a4a5be340989703edba9a7e585fbeb14f1101e00d5fe\" returns successfully" Apr 12 18:31:23.342069 env[1313]: time="2024-04-12T18:31:23.342038094Z" level=info msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.378 [WARNING][4422] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b8b1d27e-d077-4785-90cf-dbf172c7c41a", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162", Pod:"coredns-5dd5756b68-89kmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e5262db7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.378 [INFO][4422] k8s.go 585: Cleaning up netns ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.378 [INFO][4422] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" iface="eth0" netns="" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.378 [INFO][4422] k8s.go 592: Releasing IP address(es) ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.378 [INFO][4422] utils.go 188: Calico CNI releasing IP address ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.398 [INFO][4429] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.398 [INFO][4429] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.398 [INFO][4429] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.407 [WARNING][4429] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.407 [INFO][4429] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.408 [INFO][4429] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.411221 env[1313]: 2024-04-12 18:31:23.410 [INFO][4422] k8s.go 598: Teardown processing complete. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.411715 env[1313]: time="2024-04-12T18:31:23.411261642Z" level=info msg="TearDown network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" successfully" Apr 12 18:31:23.411715 env[1313]: time="2024-04-12T18:31:23.411293481Z" level=info msg="StopPodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" returns successfully" Apr 12 18:31:23.412255 env[1313]: time="2024-04-12T18:31:23.412174925Z" level=info msg="RemovePodSandbox for \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" Apr 12 18:31:23.412332 env[1313]: time="2024-04-12T18:31:23.412242562Z" level=info msg="Forcibly stopping sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\"" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.453 [WARNING][4448] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b8b1d27e-d077-4785-90cf-dbf172c7c41a", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"0ee0e49a41ea093d78057408a669c40abff6e0bed96b7354f3b5b9c80e0d4162", Pod:"coredns-5dd5756b68-89kmr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8e5262db7c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.454 [INFO][4448] k8s.go 585: Cleaning up netns ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.454 [INFO][4448] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" iface="eth0" netns="" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.454 [INFO][4448] k8s.go 592: Releasing IP address(es) ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.454 [INFO][4448] utils.go 188: Calico CNI releasing IP address ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.474 [INFO][4457] ipam_plugin.go 415: Releasing address using handleID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.474 [INFO][4457] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.474 [INFO][4457] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.483 [WARNING][4457] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.483 [INFO][4457] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" HandleID="k8s-pod-network.d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--89kmr-eth0" Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.486 [INFO][4457] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.489987 env[1313]: 2024-04-12 18:31:23.488 [INFO][4448] k8s.go 598: Teardown processing complete. ContainerID="d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60" Apr 12 18:31:23.490692 env[1313]: time="2024-04-12T18:31:23.490029917Z" level=info msg="TearDown network for sandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" successfully" Apr 12 18:31:23.498769 env[1313]: time="2024-04-12T18:31:23.498620804Z" level=info msg="RemovePodSandbox \"d55baee8c1da6a41725501ae8619e484cac84f3966d658a940441249a84c5f60\" returns successfully" Apr 12 18:31:23.500263 env[1313]: time="2024-04-12T18:31:23.500214458Z" level=info msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.538 [WARNING][4476] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8ec51e14-34ab-4b15-9aa7-a409ca77a407", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b", Pod:"coredns-5dd5756b68-fxbgg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib99a2504d71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.538 [INFO][4476] k8s.go 585: Cleaning up netns ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.538 [INFO][4476] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" iface="eth0" netns="" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.538 [INFO][4476] k8s.go 592: Releasing IP address(es) ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.538 [INFO][4476] utils.go 188: Calico CNI releasing IP address ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.559 [INFO][4482] ipam_plugin.go 415: Releasing address using handleID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.559 [INFO][4482] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.559 [INFO][4482] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.568 [WARNING][4482] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.568 [INFO][4482] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.569 [INFO][4482] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.572282 env[1313]: 2024-04-12 18:31:23.571 [INFO][4476] k8s.go 598: Teardown processing complete. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.572762 env[1313]: time="2024-04-12T18:31:23.572310928Z" level=info msg="TearDown network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" successfully" Apr 12 18:31:23.572762 env[1313]: time="2024-04-12T18:31:23.572343806Z" level=info msg="StopPodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" returns successfully" Apr 12 18:31:23.572998 env[1313]: time="2024-04-12T18:31:23.572955301Z" level=info msg="RemovePodSandbox for \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" Apr 12 18:31:23.573053 env[1313]: time="2024-04-12T18:31:23.573009019Z" level=info msg="Forcibly stopping sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\"" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.611 [WARNING][4501] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"8ec51e14-34ab-4b15-9aa7-a409ca77a407", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 30, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"db3bd386e05f8069734c64b074890b28fd62ff46a5f15473041b75745683a47b", Pod:"coredns-5dd5756b68-fxbgg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.64.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib99a2504d71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.611 [INFO][4501] k8s.go 585: Cleaning up netns ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.611 [INFO][4501] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" iface="eth0" netns="" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.611 [INFO][4501] k8s.go 592: Releasing IP address(es) ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.611 [INFO][4501] utils.go 188: Calico CNI releasing IP address ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.636 [INFO][4508] ipam_plugin.go 415: Releasing address using handleID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.636 [INFO][4508] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.636 [INFO][4508] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.645 [WARNING][4508] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.645 [INFO][4508] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" HandleID="k8s-pod-network.6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Workload="ci--3510.3.3--a--2842bd657c-k8s-coredns--5dd5756b68--fxbgg-eth0" Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.647 [INFO][4508] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:23.649885 env[1313]: 2024-04-12 18:31:23.648 [INFO][4501] k8s.go 598: Teardown processing complete. ContainerID="6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b" Apr 12 18:31:23.650411 env[1313]: time="2024-04-12T18:31:23.649911051Z" level=info msg="TearDown network for sandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" successfully" Apr 12 18:31:23.666700 env[1313]: time="2024-04-12T18:31:23.666638122Z" level=info msg="RemovePodSandbox \"6c8b43296efd002678ffd1d0c651669d82682823a8757fe4d64d5b205130601b\" returns successfully" Apr 12 18:31:24.407000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.413403 kernel: kauditd_printk_skb: 100 callbacks suppressed Apr 12 18:31:24.413519 kernel: audit: type=1400 audit(1712946684.407:1339): avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.407000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001034360 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.473772 kernel: audit: type=1300 audit(1712946684.407:1339): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001034360 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.506527 kernel: audit: type=1327 audit(1712946684.407:1339): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.509422 kernel: audit: type=1400 audit(1712946684.407:1340): avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.407000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.407000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010343a0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.569889 kernel: audit: type=1300 audit(1712946684.407:1340): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010343a0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.594144 kernel: audit: type=1327 audit(1712946684.407:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.594276 kernel: audit: type=1400 audit(1712946684.415:1341): avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.415000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.415000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a4700 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.645804 kernel: audit: type=1300 audit(1712946684.415:1341): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009a4700 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.415000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.670383 kernel: audit: type=1327 audit(1712946684.415:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:24.670526 kernel: audit: type=1400 audit(1712946684.416:1342): avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.416000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:24.416000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001035640 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:31:24.416000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:34.001927 kubelet[2440]: I0412 18:31:34.001875 2440 topology_manager.go:215] "Topology Admit Handler" podUID="2f8c12a4-11a6-4b2e-9144-09ec0171780b" podNamespace="calico-apiserver" podName="calico-apiserver-8689988979-k25q7" Apr 12 18:31:34.007459 systemd[1]: Created slice kubepods-besteffort-pod2f8c12a4_11a6_4b2e_9144_09ec0171780b.slice. Apr 12 18:31:34.026002 kubelet[2440]: I0412 18:31:34.025956 2440 topology_manager.go:215] "Topology Admit Handler" podUID="bac4055f-fbe9-45c0-ba41-c44fb66adcf8" podNamespace="calico-apiserver" podName="calico-apiserver-8689988979-6qpgm" Apr 12 18:31:34.031738 systemd[1]: Created slice kubepods-besteffort-podbac4055f_fbe9_45c0_ba41_c44fb66adcf8.slice. Apr 12 18:31:34.060000 audit[4571]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.066481 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:31:34.066644 kernel: audit: type=1325 audit(1712946694.060:1343): table=filter:116 family=2 entries=9 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.060000 audit[4571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe4e1ebb0 a2=0 a3=1 items=0 ppid=2619 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.086293 kubelet[2440]: I0412 18:31:34.086250 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2f8c12a4-11a6-4b2e-9144-09ec0171780b-calico-apiserver-certs\") pod \"calico-apiserver-8689988979-k25q7\" (UID: \"2f8c12a4-11a6-4b2e-9144-09ec0171780b\") " pod="calico-apiserver/calico-apiserver-8689988979-k25q7" Apr 12 18:31:34.086549 kubelet[2440]: I0412 18:31:34.086538 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bac4055f-fbe9-45c0-ba41-c44fb66adcf8-calico-apiserver-certs\") pod \"calico-apiserver-8689988979-6qpgm\" (UID: \"bac4055f-fbe9-45c0-ba41-c44fb66adcf8\") " pod="calico-apiserver/calico-apiserver-8689988979-6qpgm" Apr 12 18:31:34.086732 kubelet[2440]: I0412 18:31:34.086720 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8phvd\" (UniqueName: \"kubernetes.io/projected/2f8c12a4-11a6-4b2e-9144-09ec0171780b-kube-api-access-8phvd\") pod \"calico-apiserver-8689988979-k25q7\" (UID: \"2f8c12a4-11a6-4b2e-9144-09ec0171780b\") " pod="calico-apiserver/calico-apiserver-8689988979-k25q7" Apr 12 18:31:34.086874 kubelet[2440]: I0412 18:31:34.086864 2440 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8tjcd\" (UniqueName: \"kubernetes.io/projected/bac4055f-fbe9-45c0-ba41-c44fb66adcf8-kube-api-access-8tjcd\") pod \"calico-apiserver-8689988979-6qpgm\" (UID: \"bac4055f-fbe9-45c0-ba41-c44fb66adcf8\") " pod="calico-apiserver/calico-apiserver-8689988979-6qpgm" Apr 12 18:31:34.108705 kernel: audit: type=1300 audit(1712946694.060:1343): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe4e1ebb0 a2=0 a3=1 items=0 ppid=2619 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.126168 kernel: audit: type=1327 audit(1712946694.060:1343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.064000 audit[4571]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.142579 kernel: audit: type=1325 audit(1712946694.064:1344): table=nat:117 family=2 entries=20 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.142728 kernel: audit: type=1300 audit(1712946694.064:1344): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe4e1ebb0 a2=0 a3=1 items=0 ppid=2619 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.064000 audit[4571]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe4e1ebb0 a2=0 a3=1 items=0 ppid=2619 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.183817 kernel: audit: type=1327 audit(1712946694.064:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.183972 kernel: audit: type=1325 audit(1712946694.144:1345): table=filter:118 family=2 entries=10 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.144000 audit[4573]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.187976 kubelet[2440]: E0412 18:31:34.187948 2440 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:31:34.188202 kubelet[2440]: E0412 18:31:34.188179 2440 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2f8c12a4-11a6-4b2e-9144-09ec0171780b-calico-apiserver-certs podName:2f8c12a4-11a6-4b2e-9144-09ec0171780b nodeName:}" failed. No retries permitted until 2024-04-12 18:31:34.688159892 +0000 UTC m=+71.827242293 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2f8c12a4-11a6-4b2e-9144-09ec0171780b-calico-apiserver-certs") pod "calico-apiserver-8689988979-k25q7" (UID: "2f8c12a4-11a6-4b2e-9144-09ec0171780b") : secret "calico-apiserver-certs" not found Apr 12 18:31:34.188621 kubelet[2440]: E0412 18:31:34.188604 2440 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:31:34.188776 kubelet[2440]: E0412 18:31:34.188764 2440 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bac4055f-fbe9-45c0-ba41-c44fb66adcf8-calico-apiserver-certs podName:bac4055f-fbe9-45c0-ba41-c44fb66adcf8 nodeName:}" failed. No retries permitted until 2024-04-12 18:31:34.688750549 +0000 UTC m=+71.827832990 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/bac4055f-fbe9-45c0-ba41-c44fb66adcf8-calico-apiserver-certs") pod "calico-apiserver-8689988979-6qpgm" (UID: "bac4055f-fbe9-45c0-ba41-c44fb66adcf8") : secret "calico-apiserver-certs" not found Apr 12 18:31:34.144000 audit[4573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc1230d20 a2=0 a3=1 items=0 ppid=2619 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.224514 kernel: audit: type=1300 audit(1712946694.144:1345): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc1230d20 a2=0 a3=1 items=0 ppid=2619 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.249206 kernel: audit: type=1327 audit(1712946694.144:1345): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.249361 kernel: audit: type=1325 audit(1712946694.149:1346): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.149000 audit[4573]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4573 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:34.149000 audit[4573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc1230d20 a2=0 a3=1 items=0 ppid=2619 pid=4573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:34.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:34.912212 env[1313]: time="2024-04-12T18:31:34.911772046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8689988979-k25q7,Uid:2f8c12a4-11a6-4b2e-9144-09ec0171780b,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:31:34.936768 env[1313]: time="2024-04-12T18:31:34.936587004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8689988979-6qpgm,Uid:bac4055f-fbe9-45c0-ba41-c44fb66adcf8,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:31:35.135821 systemd-networkd[1458]: cali0ffb8a12e27: Link UP Apr 12 18:31:35.151044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:31:35.151246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ffb8a12e27: link becomes ready Apr 12 18:31:35.155272 systemd-networkd[1458]: cali0ffb8a12e27: Gained carrier Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.018 [INFO][4578] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0 calico-apiserver-8689988979- calico-apiserver 2f8c12a4-11a6-4b2e-9144-09ec0171780b 826 0 2024-04-12 18:31:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8689988979 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c calico-apiserver-8689988979-k25q7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0ffb8a12e27 [] []}} ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.019 [INFO][4578] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.074 [INFO][4606] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" HandleID="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.087 [INFO][4606] ipam_plugin.go 268: Auto assigning IP ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" HandleID="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f7440), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-2842bd657c", "pod":"calico-apiserver-8689988979-k25q7", "timestamp":"2024-04-12 18:31:35.07481502 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.087 [INFO][4606] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.087 [INFO][4606] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.087 [INFO][4606] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.089 [INFO][4606] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.103 [INFO][4606] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.110 [INFO][4606] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.112 [INFO][4606] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.114 [INFO][4606] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.114 [INFO][4606] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.116 [INFO][4606] ipam.go 1682: Creating new handle: k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06 Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.119 [INFO][4606] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.127 [INFO][4606] ipam.go 1216: Successfully claimed IPs: [192.168.64.5/26] block=192.168.64.0/26 handle="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.127 [INFO][4606] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.5/26] handle="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.127 [INFO][4606] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:35.168661 env[1313]: 2024-04-12 18:31:35.127 [INFO][4606] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.5/26] IPv6=[] ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" HandleID="k8s-pod-network.783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.130 [INFO][4578] k8s.go 385: Populated endpoint ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0", GenerateName:"calico-apiserver-8689988979-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8c12a4-11a6-4b2e-9144-09ec0171780b", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 31, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8689988979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"calico-apiserver-8689988979-k25q7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ffb8a12e27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.130 [INFO][4578] k8s.go 386: Calico CNI using IPs: [192.168.64.5/32] ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.130 [INFO][4578] dataplane_linux.go 68: Setting the host side veth name to cali0ffb8a12e27 ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.156 [INFO][4578] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.156 [INFO][4578] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0", GenerateName:"calico-apiserver-8689988979-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8c12a4-11a6-4b2e-9144-09ec0171780b", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 31, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8689988979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06", Pod:"calico-apiserver-8689988979-k25q7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ffb8a12e27", MAC:"fe:85:84:f6:6d:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:35.169463 env[1313]: 2024-04-12 18:31:35.165 [INFO][4578] k8s.go 498: Wrote updated endpoint to datastore ContainerID="783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-k25q7" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--k25q7-eth0" Apr 12 18:31:35.200764 env[1313]: time="2024-04-12T18:31:35.199895475Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:35.200764 env[1313]: time="2024-04-12T18:31:35.199996231Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:35.200764 env[1313]: time="2024-04-12T18:31:35.200034230Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:35.200764 env[1313]: time="2024-04-12T18:31:35.200175184Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06 pid=4642 runtime=io.containerd.runc.v2 Apr 12 18:31:35.207831 systemd-networkd[1458]: calie177f5fdf24: Link UP Apr 12 18:31:35.218640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie177f5fdf24: link becomes ready Apr 12 18:31:35.218264 systemd-networkd[1458]: calie177f5fdf24: Gained carrier Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.046 [INFO][4591] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0 calico-apiserver-8689988979- calico-apiserver bac4055f-fbe9-45c0-ba41-c44fb66adcf8 830 0 2024-04-12 18:31:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8689988979 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-2842bd657c calico-apiserver-8689988979-6qpgm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie177f5fdf24 [] []}} ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.046 [INFO][4591] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.091 [INFO][4612] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" HandleID="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.109 [INFO][4612] ipam_plugin.go 268: Auto assigning IP ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" HandleID="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000262f90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-2842bd657c", "pod":"calico-apiserver-8689988979-6qpgm", "timestamp":"2024-04-12 18:31:35.091718568 +0000 UTC"}, Hostname:"ci-3510.3.3-a-2842bd657c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.109 [INFO][4612] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.127 [INFO][4612] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.127 [INFO][4612] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-2842bd657c' Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.151 [INFO][4612] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.156 [INFO][4612] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.170 [INFO][4612] ipam.go 489: Trying affinity for 192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.173 [INFO][4612] ipam.go 155: Attempting to load block cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.183 [INFO][4612] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.0/26 host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.183 [INFO][4612] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.0/26 handle="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.186 [INFO][4612] ipam.go 1682: Creating new handle: k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.191 [INFO][4612] ipam.go 1203: Writing block in order to claim IPs block=192.168.64.0/26 handle="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.201 [INFO][4612] ipam.go 1216: Successfully claimed IPs: [192.168.64.6/26] block=192.168.64.0/26 handle="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.201 [INFO][4612] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.6/26] handle="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" host="ci-3510.3.3-a-2842bd657c" Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.201 [INFO][4612] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:31:35.245674 env[1313]: 2024-04-12 18:31:35.201 [INFO][4612] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.64.6/26] IPv6=[] ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" HandleID="k8s-pod-network.c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Workload="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.204 [INFO][4591] k8s.go 385: Populated endpoint ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0", GenerateName:"calico-apiserver-8689988979-", Namespace:"calico-apiserver", SelfLink:"", UID:"bac4055f-fbe9-45c0-ba41-c44fb66adcf8", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 31, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8689988979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"", Pod:"calico-apiserver-8689988979-6qpgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie177f5fdf24", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.204 [INFO][4591] k8s.go 386: Calico CNI using IPs: [192.168.64.6/32] ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.204 [INFO][4591] dataplane_linux.go 68: Setting the host side veth name to calie177f5fdf24 ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.218 [INFO][4591] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.219 [INFO][4591] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0", GenerateName:"calico-apiserver-8689988979-", Namespace:"calico-apiserver", SelfLink:"", UID:"bac4055f-fbe9-45c0-ba41-c44fb66adcf8", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 31, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8689988979", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-2842bd657c", ContainerID:"c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c", Pod:"calico-apiserver-8689988979-6qpgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.64.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie177f5fdf24", MAC:"5e:bc:27:86:5a:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:31:35.246302 env[1313]: 2024-04-12 18:31:35.238 [INFO][4591] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c" Namespace="calico-apiserver" Pod="calico-apiserver-8689988979-6qpgm" WorkloadEndpoint="ci--3510.3.3--a--2842bd657c-k8s-calico--apiserver--8689988979--6qpgm-eth0" Apr 12 18:31:35.250264 systemd[1]: Started cri-containerd-783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06.scope. Apr 12 18:31:35.278359 env[1313]: time="2024-04-12T18:31:35.278253532Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:35.278359 env[1313]: time="2024-04-12T18:31:35.278355449Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:35.278565 env[1313]: time="2024-04-12T18:31:35.278383207Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:35.278634 env[1313]: time="2024-04-12T18:31:35.278594319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c pid=4689 runtime=io.containerd.runc.v2 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit: BPF prog-id=187 op=LOAD Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4642 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336139323263373861333034303436336164616266373166343339 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4642 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336139323263373861333034303436336164616266373166343339 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.293000 audit: BPF prog-id=188 op=LOAD Apr 12 18:31:35.293000 audit[4651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4642 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336139323263373861333034303436336164616266373166343339 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit: BPF prog-id=189 op=LOAD Apr 12 18:31:35.294000 audit[4651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4642 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336139323263373861333034303436336164616266373166343339 Apr 12 18:31:35.294000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:31:35.294000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { perfmon } for pid=4651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit[4651]: AVC avc: denied { bpf } for pid=4651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.294000 audit: BPF prog-id=190 op=LOAD Apr 12 18:31:35.294000 audit[4651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4642 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336139323263373861333034303436336164616266373166343339 Apr 12 18:31:35.312738 systemd[1]: run-containerd-runc-k8s.io-c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c-runc.KV0eBu.mount: Deactivated successfully. Apr 12 18:31:35.316782 systemd[1]: Started cri-containerd-c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c.scope. Apr 12 18:31:35.352219 env[1313]: time="2024-04-12T18:31:35.352177841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8689988979-k25q7,Uid:2f8c12a4-11a6-4b2e-9144-09ec0171780b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06\"" Apr 12 18:31:35.354155 env[1313]: time="2024-04-12T18:31:35.354111446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.364000 audit: BPF prog-id=191 op=LOAD Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4689 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338356430336139333364646536343964303366323061306330333365 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4689 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338356430336139333364646536343964303366323061306330333365 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit: BPF prog-id=192 op=LOAD Apr 12 18:31:35.365000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4689 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338356430336139333364646536343964303366323061306330333365 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit: BPF prog-id=193 op=LOAD Apr 12 18:31:35.365000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4689 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338356430336139333364646536343964303366323061306330333365 Apr 12 18:31:35.365000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:31:35.365000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { perfmon } for pid=4700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit[4700]: AVC avc: denied { bpf } for pid=4700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:35.365000 audit: BPF prog-id=194 op=LOAD Apr 12 18:31:35.365000 audit[4700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4689 pid=4700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338356430336139333364646536343964303366323061306330333365 Apr 12 18:31:35.360000 audit[4724]: NETFILTER_CFG table=filter:120 family=2 entries=59 op=nft_register_chain pid=4724 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:35.360000 audit[4724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffdfa2eac0 a2=0 a3=ffffa9acdfa8 items=0 ppid=3476 pid=4724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.360000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:35.398000 audit[4731]: NETFILTER_CFG table=filter:121 family=2 entries=56 op=nft_register_chain pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:31:35.398000 audit[4731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27932 a0=3 a1=ffffe0e096b0 a2=0 a3=ffff94667fa8 items=0 ppid=3476 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:35.398000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:31:35.412965 env[1313]: time="2024-04-12T18:31:35.412920058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8689988979-6qpgm,Uid:bac4055f-fbe9-45c0-ba41-c44fb66adcf8,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c\"" Apr 12 18:31:36.617058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292450573.mount: Deactivated successfully. Apr 12 18:31:37.170935 systemd-networkd[1458]: cali0ffb8a12e27: Gained IPv6LL Apr 12 18:31:37.235374 systemd-networkd[1458]: calie177f5fdf24: Gained IPv6LL Apr 12 18:31:38.018267 env[1313]: time="2024-04-12T18:31:38.018190571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.030661 env[1313]: time="2024-04-12T18:31:38.030615378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.036424 env[1313]: time="2024-04-12T18:31:38.036362559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.045603 env[1313]: time="2024-04-12T18:31:38.045561209Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.046213 env[1313]: time="2024-04-12T18:31:38.046177706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:31:38.048576 env[1313]: time="2024-04-12T18:31:38.047206307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:31:38.049562 env[1313]: time="2024-04-12T18:31:38.048918921Z" level=info msg="CreateContainer within sandbox \"783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:31:38.111742 env[1313]: time="2024-04-12T18:31:38.111628415Z" level=info msg="CreateContainer within sandbox \"783a922c78a3040463adabf71f439c11b39a4f60dd6532584d149d0a40bf1a06\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6\"" Apr 12 18:31:38.112944 env[1313]: time="2024-04-12T18:31:38.112905406Z" level=info msg="StartContainer for \"f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6\"" Apr 12 18:31:38.155916 systemd[1]: Started cri-containerd-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6.scope. Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit: BPF prog-id=195 op=LOAD Apr 12 18:31:38.181000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4642 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613737363335326330383038316466663365313661333637663231 Apr 12 18:31:38.181000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.181000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4642 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613737363335326330383038316466663365313661333637663231 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit: BPF prog-id=196 op=LOAD Apr 12 18:31:38.182000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4642 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613737363335326330383038316466663365313661333637663231 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit: BPF prog-id=197 op=LOAD Apr 12 18:31:38.182000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4642 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613737363335326330383038316466663365313661333637663231 Apr 12 18:31:38.182000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:31:38.182000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.182000 audit: BPF prog-id=198 op=LOAD Apr 12 18:31:38.182000 audit[4741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4642 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635613737363335326330383038316466663365313661333637663231 Apr 12 18:31:38.213961 env[1313]: time="2024-04-12T18:31:38.213880083Z" level=info msg="StartContainer for \"f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6\" returns successfully" Apr 12 18:31:38.278363 kubelet[2440]: I0412 18:31:38.278227 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8689988979-k25q7" podStartSLOduration=2.584878023 podCreationTimestamp="2024-04-12 18:31:33 +0000 UTC" firstStartedPulling="2024-04-12 18:31:35.353734221 +0000 UTC m=+72.492816662" lastFinishedPulling="2024-04-12 18:31:38.047044913 +0000 UTC m=+75.186127354" observedRunningTime="2024-04-12 18:31:38.276024757 +0000 UTC m=+75.415107198" watchObservedRunningTime="2024-04-12 18:31:38.278188715 +0000 UTC m=+75.417271156" Apr 12 18:31:38.309000 audit[4771]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:38.309000 audit[4771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc91ccbd0 a2=0 a3=1 items=0 ppid=2619 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:38.310000 audit[4771]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:38.310000 audit[4771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc91ccbd0 a2=0 a3=1 items=0 ppid=2619 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:38.359975 env[1313]: time="2024-04-12T18:31:38.359919284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.367914 env[1313]: time="2024-04-12T18:31:38.367863182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.374772 env[1313]: time="2024-04-12T18:31:38.374712281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.379624 env[1313]: time="2024-04-12T18:31:38.379559017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.380206 env[1313]: time="2024-04-12T18:31:38.380156314Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:31:38.382719 env[1313]: time="2024-04-12T18:31:38.382668138Z" level=info msg="CreateContainer within sandbox \"c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:31:38.430727 env[1313]: time="2024-04-12T18:31:38.430652192Z" level=info msg="CreateContainer within sandbox \"c85d03a933dde649d03f20a0c033eb7ee0bcbec8a27dcecc8e82daa899ce2e9c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67\"" Apr 12 18:31:38.431539 env[1313]: time="2024-04-12T18:31:38.431465681Z" level=info msg="StartContainer for \"79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67\"" Apr 12 18:31:38.451287 systemd[1]: Started cri-containerd-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67.scope. Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit: BPF prog-id=199 op=LOAD Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4689 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739636162353636616561353739396331613238373961346465376533 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4689 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739636162353636616561353739396331613238373961346465376533 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.482000 audit: BPF prog-id=200 op=LOAD Apr 12 18:31:38.482000 audit[4779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4689 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739636162353636616561353739396331613238373961346465376533 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit: BPF prog-id=201 op=LOAD Apr 12 18:31:38.483000 audit[4779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4689 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739636162353636616561353739396331613238373961346465376533 Apr 12 18:31:38.483000 audit: BPF prog-id=201 op=UNLOAD Apr 12 18:31:38.483000 audit: BPF prog-id=200 op=UNLOAD Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { perfmon } for pid=4779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit[4779]: AVC avc: denied { bpf } for pid=4779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:38.483000 audit: BPF prog-id=202 op=LOAD Apr 12 18:31:38.483000 audit[4779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4689 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:38.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739636162353636616561353739396331613238373961346465376533 Apr 12 18:31:38.517956 env[1313]: time="2024-04-12T18:31:38.517903111Z" level=info msg="StartContainer for \"79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67\" returns successfully" Apr 12 18:31:39.089148 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.rkQYhN.mount: Deactivated successfully. Apr 12 18:31:39.281782 kubelet[2440]: I0412 18:31:39.281740 2440 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8689988979-6qpgm" podStartSLOduration=3.315398751 podCreationTimestamp="2024-04-12 18:31:33 +0000 UTC" firstStartedPulling="2024-04-12 18:31:35.414568954 +0000 UTC m=+72.553651395" lastFinishedPulling="2024-04-12 18:31:38.380868487 +0000 UTC m=+75.519950928" observedRunningTime="2024-04-12 18:31:39.280601206 +0000 UTC m=+76.419683647" watchObservedRunningTime="2024-04-12 18:31:39.281698284 +0000 UTC m=+76.420780725" Apr 12 18:31:39.319648 kernel: kauditd_printk_skb: 242 callbacks suppressed Apr 12 18:31:39.319804 kernel: audit: type=1325 audit(1712946699.309:1423): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:39.309000 audit[4820]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:39.309000 audit[4820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdc402310 a2=0 a3=1 items=0 ppid=2619 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:39.358150 kernel: audit: type=1300 audit(1712946699.309:1423): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdc402310 a2=0 a3=1 items=0 ppid=2619 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:39.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:39.371807 kernel: audit: type=1327 audit(1712946699.309:1423): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:39.322000 audit[4820]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:39.386479 kernel: audit: type=1325 audit(1712946699.322:1424): table=nat:125 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:31:39.322000 audit[4820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdc402310 a2=0 a3=1 items=0 ppid=2619 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:39.412846 kernel: audit: type=1300 audit(1712946699.322:1424): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdc402310 a2=0 a3=1 items=0 ppid=2619 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:39.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:39.429737 kernel: audit: type=1327 audit(1712946699.322:1424): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:31:39.583000 audit[4753]: AVC avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:31:39.583000 audit[4753]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d99700 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:31:39.644868 kernel: audit: type=1400 audit(1712946699.583:1425): avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:31:39.645022 kernel: audit: type=1300 audit(1712946699.583:1425): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000d99700 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:31:39.583000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:31:39.671618 kernel: audit: type=1327 audit(1712946699.583:1425): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:31:40.238000 audit[4794]: AVC avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:31:40.238000 audit[4794]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e91c80 a2=fc6 a3=0 items=0 ppid=4689 pid=4794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 key=(null) Apr 12 18:31:40.238000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:31:40.267525 kernel: audit: type=1400 audit(1712946700.238:1426): avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:31:49.134306 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.iAZmiz.mount: Deactivated successfully. Apr 12 18:31:57.229768 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.UcIQPT.mount: Deactivated successfully. Apr 12 18:32:02.095068 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.BygDUE.mount: Deactivated successfully. Apr 12 18:32:05.028000 audit[4945]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.034263 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:32:05.034401 kernel: audit: type=1325 audit(1712946725.028:1427): table=filter:126 family=2 entries=9 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.028000 audit[4945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffddbc9490 a2=0 a3=1 items=0 ppid=2619 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.074750 kernel: audit: type=1300 audit(1712946725.028:1427): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffddbc9490 a2=0 a3=1 items=0 ppid=2619 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.088918 kernel: audit: type=1327 audit(1712946725.028:1427): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.039000 audit[4945]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.103403 kernel: audit: type=1325 audit(1712946725.039:1428): table=nat:127 family=2 entries=27 op=nft_register_chain pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.039000 audit[4945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffddbc9490 a2=0 a3=1 items=0 ppid=2619 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.129889 kernel: audit: type=1300 audit(1712946725.039:1428): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffddbc9490 a2=0 a3=1 items=0 ppid=2619 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.143459 kernel: audit: type=1327 audit(1712946725.039:1428): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.167000 audit[4951]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.167000 audit[4951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff9ec8fc0 a2=0 a3=1 items=0 ppid=2619 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.209633 kernel: audit: type=1325 audit(1712946725.167:1429): table=filter:128 family=2 entries=8 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.209779 kernel: audit: type=1300 audit(1712946725.167:1429): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff9ec8fc0 a2=0 a3=1 items=0 ppid=2619 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.226438 kernel: audit: type=1327 audit(1712946725.167:1429): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:05.170000 audit[4951]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_chain pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.240368 kernel: audit: type=1325 audit(1712946725.170:1430): table=nat:129 family=2 entries=34 op=nft_register_chain pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:05.170000 audit[4951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff9ec8fc0 a2=0 a3=1 items=0 ppid=2619 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:05.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:19.463000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.468750 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:32:19.468897 kernel: audit: type=1400 audit(1712946739.463:1431): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.463000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa885d0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.519846 kernel: audit: type=1300 audit(1712946739.463:1431): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa885d0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.544738 kernel: audit: type=1327 audit(1712946739.463:1431): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.545005 kernel: audit: type=1400 audit(1712946739.463:1432): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.463000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.463000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa88630 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.594061 kernel: audit: type=1300 audit(1712946739.463:1432): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa88630 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.618199 kernel: audit: type=1327 audit(1712946739.463:1432): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.618374 kernel: audit: type=1400 audit(1712946739.468:1433): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.468000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.468000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa887b0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.668113 kernel: audit: type=1300 audit(1712946739.468:1433): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa887b0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.693443 kernel: audit: type=1327 audit(1712946739.468:1433): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.470000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.716895 kernel: audit: type=1400 audit(1712946739.470:1434): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.470000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a3fb460 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.475000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.475000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400aa88810 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.476000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.476000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400a3fb4a0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:32:19.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:19.928000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.928000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002618080 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:19.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:19.928000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:19.928000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020f5530 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:19.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:24.408000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:24.408000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002618340 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:24.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:24.408000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:24.408000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002467280 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:24.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:24.417000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:24.417000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002618360 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:24.417000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:24.418000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:24.418000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024675a0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:32:24.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:27.229052 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.DWgLlG.mount: Deactivated successfully. Apr 12 18:32:32.095782 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.UlVfGK.mount: Deactivated successfully. Apr 12 18:32:34.930353 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.ydtPAe.mount: Deactivated successfully. Apr 12 18:32:35.923935 systemd[1]: run-containerd-runc-k8s.io-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67-runc.yGF6v3.mount: Deactivated successfully. Apr 12 18:32:39.584000 audit[4753]: AVC avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:32:39.590122 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 18:32:39.590337 kernel: audit: type=1400 audit(1712946759.584:1443): avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:32:39.584000 audit[4753]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000445ca0 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:32:39.646511 kernel: audit: type=1300 audit(1712946759.584:1443): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000445ca0 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:32:39.584000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:32:39.670516 kernel: audit: type=1327 audit(1712946759.584:1443): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:32:40.239000 audit[4794]: AVC avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:32:40.239000 audit[4794]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005ba920 a2=fc6 a3=0 items=0 ppid=4689 pid=4794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 key=(null) Apr 12 18:32:40.293923 kernel: audit: type=1400 audit(1712946760.239:1444): avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:32:40.294053 kernel: audit: type=1300 audit(1712946760.239:1444): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005ba920 a2=fc6 a3=0 items=0 ppid=4689 pid=4794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 key=(null) Apr 12 18:32:40.239000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:32:40.318374 kernel: audit: type=1327 audit(1712946760.239:1444): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:32:49.135893 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.31kzFF.mount: Deactivated successfully. Apr 12 18:32:57.226128 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.g2cq8L.mount: Deactivated successfully. Apr 12 18:33:02.096266 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.peAIQ2.mount: Deactivated successfully. Apr 12 18:33:04.929592 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.oDURDL.mount: Deactivated successfully. Apr 12 18:33:05.923688 systemd[1]: run-containerd-runc-k8s.io-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67-runc.ZewjnW.mount: Deactivated successfully. Apr 12 18:33:19.463000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.463000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011d6b8c0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.515209 kernel: audit: type=1400 audit(1712946799.463:1445): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.515372 kernel: audit: type=1300 audit(1712946799.463:1445): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011d6b8c0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.539986 kernel: audit: type=1327 audit(1712946799.463:1445): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.464000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.562752 kernel: audit: type=1400 audit(1712946799.464:1446): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.464000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4012387200 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.589865 kernel: audit: type=1300 audit(1712946799.464:1446): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4012387200 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.590031 kernel: audit: type=1327 audit(1712946799.464:1446): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.468000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.638474 kernel: audit: type=1400 audit(1712946799.468:1447): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.468000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011d6ba40 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.666489 kernel: audit: type=1300 audit(1712946799.468:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4011d6ba40 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.690531 kernel: audit: type=1327 audit(1712946799.468:1447): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.470000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.712932 kernel: audit: type=1400 audit(1712946799.470:1448): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.470000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40125cc6c0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.475000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.475000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4012387320 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.476000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.476000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40125cc6e0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:33:19.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:19.927000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.927000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400297fcc0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:19.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:19.929000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:19.929000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400147d1d0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:19.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:24.409000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:24.409000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:24.409000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001380080 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:24.409000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000faccc0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:24.418000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:24.418000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001380240 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:24.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:24.418000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:24.418000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001380280 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:33:24.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:25.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:35808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:25.582723 systemd[1]: Started sshd@7-10.200.20.38:22-10.200.12.6:35808.service. Apr 12 18:33:25.587808 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 18:33:25.587926 kernel: audit: type=1130 audit(1712946805.582:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:35808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:26.025000 audit[5224]: USER_ACCT pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.026778 sshd[5224]: Accepted publickey for core from 10.200.12.6 port 35808 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:26.051541 kernel: audit: type=1101 audit(1712946806.025:1458): pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.051000 audit[5224]: CRED_ACQ pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.052230 sshd[5224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:26.088546 kernel: audit: type=1103 audit(1712946806.051:1459): pid=5224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.088680 kernel: audit: type=1006 audit(1712946806.051:1460): pid=5224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:33:26.051000 audit[5224]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8eb8790 a2=3 a3=1 items=0 ppid=1 pid=5224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:26.114334 kernel: audit: type=1300 audit(1712946806.051:1460): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8eb8790 a2=3 a3=1 items=0 ppid=1 pid=5224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:26.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:26.124599 kernel: audit: type=1327 audit(1712946806.051:1460): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:26.122413 systemd[1]: Started session-10.scope. Apr 12 18:33:26.123677 systemd-logind[1300]: New session 10 of user core. Apr 12 18:33:26.129000 audit[5224]: USER_START pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.131000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.176735 kernel: audit: type=1105 audit(1712946806.129:1461): pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.176873 kernel: audit: type=1103 audit(1712946806.131:1462): pid=5229 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.455687 sshd[5224]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:26.456000 audit[5224]: USER_END pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.459614 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:33:26.460515 systemd[1]: sshd@7-10.200.20.38:22-10.200.12.6:35808.service: Deactivated successfully. Apr 12 18:33:26.456000 audit[5224]: CRED_DISP pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.483556 systemd-logind[1300]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:33:26.504928 kernel: audit: type=1106 audit(1712946806.456:1463): pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.505096 kernel: audit: type=1104 audit(1712946806.456:1464): pid=5224 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:26.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:35808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:26.506642 systemd-logind[1300]: Removed session 10. Apr 12 18:33:27.230916 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.UjmKor.mount: Deactivated successfully. Apr 12 18:33:31.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.525478 systemd[1]: Started sshd@8-10.200.20.38:22-10.200.12.6:35812.service. Apr 12 18:33:31.530740 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:31.530866 kernel: audit: type=1130 audit(1712946811.524:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:31.953000 audit[5260]: USER_ACCT pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:31.955002 sshd[5260]: Accepted publickey for core from 10.200.12.6 port 35812 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:31.981487 sshd[5260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:31.979000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.006693 kernel: audit: type=1101 audit(1712946811.953:1467): pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.006852 kernel: audit: type=1103 audit(1712946811.979:1468): pid=5260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.011235 systemd-logind[1300]: New session 11 of user core. Apr 12 18:33:32.011905 systemd[1]: Started session-11.scope. Apr 12 18:33:31.979000 audit[5260]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2053b50 a2=3 a3=1 items=0 ppid=1 pid=5260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:32.047211 kernel: audit: type=1006 audit(1712946811.979:1469): pid=5260 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:33:32.047371 kernel: audit: type=1300 audit(1712946811.979:1469): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2053b50 a2=3 a3=1 items=0 ppid=1 pid=5260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:31.979000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:32.055736 kernel: audit: type=1327 audit(1712946811.979:1469): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:32.016000 audit[5260]: USER_START pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.081292 kernel: audit: type=1105 audit(1712946812.016:1470): pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.021000 audit[5262]: CRED_ACQ pid=5262 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.106910 kernel: audit: type=1103 audit(1712946812.021:1471): pid=5262 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.112989 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.XQLpp9.mount: Deactivated successfully. Apr 12 18:33:32.365008 sshd[5260]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:32.366000 audit[5260]: USER_END pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.369926 systemd-logind[1300]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:33:32.371347 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:33:32.372597 systemd-logind[1300]: Removed session 11. Apr 12 18:33:32.373317 systemd[1]: sshd@8-10.200.20.38:22-10.200.12.6:35812.service: Deactivated successfully. Apr 12 18:33:32.367000 audit[5260]: CRED_DISP pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.413228 kernel: audit: type=1106 audit(1712946812.366:1472): pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.413403 kernel: audit: type=1104 audit(1712946812.367:1473): pid=5260 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:32.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:35812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:34.943703 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.HoGowr.mount: Deactivated successfully. Apr 12 18:33:37.441656 systemd[1]: Started sshd@9-10.200.20.38:22-10.200.12.6:57110.service. Apr 12 18:33:37.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:57110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:37.446853 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:37.446979 kernel: audit: type=1130 audit(1712946817.441:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:57110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:37.905000 audit[5336]: USER_ACCT pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.906395 sshd[5336]: Accepted publickey for core from 10.200.12.6 port 57110 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:37.929000 audit[5336]: CRED_ACQ pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.931414 sshd[5336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:37.953158 kernel: audit: type=1101 audit(1712946817.905:1476): pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.953316 kernel: audit: type=1103 audit(1712946817.929:1477): pid=5336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.967910 kernel: audit: type=1006 audit(1712946817.929:1478): pid=5336 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:33:37.929000 audit[5336]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5743c80 a2=3 a3=1 items=0 ppid=1 pid=5336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.973109 systemd[1]: Started session-12.scope. Apr 12 18:33:37.974533 systemd-logind[1300]: New session 12 of user core. Apr 12 18:33:37.992165 kernel: audit: type=1300 audit(1712946817.929:1478): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5743c80 a2=3 a3=1 items=0 ppid=1 pid=5336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.929000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:38.000687 kernel: audit: type=1327 audit(1712946817.929:1478): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:38.002572 kernel: audit: type=1105 audit(1712946817.978:1479): pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.978000 audit[5336]: USER_START pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:37.980000 audit[5338]: CRED_ACQ pid=5338 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.049446 kernel: audit: type=1103 audit(1712946817.980:1480): pid=5338 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.306728 sshd[5336]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:38.306000 audit[5336]: USER_END pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.310945 systemd-logind[1300]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:33:38.312223 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:33:38.314784 systemd-logind[1300]: Removed session 12. Apr 12 18:33:38.315770 systemd[1]: sshd@9-10.200.20.38:22-10.200.12.6:57110.service: Deactivated successfully. Apr 12 18:33:38.307000 audit[5336]: CRED_DISP pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.356270 kernel: audit: type=1106 audit(1712946818.306:1481): pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.356421 kernel: audit: type=1104 audit(1712946818.307:1482): pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:57110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:38.406823 systemd[1]: Started sshd@10-10.200.20.38:22-10.200.12.6:57116.service. Apr 12 18:33:38.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:57116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:38.841000 audit[5349]: USER_ACCT pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.843121 sshd[5349]: Accepted publickey for core from 10.200.12.6 port 57116 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:38.842000 audit[5349]: CRED_ACQ pid=5349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.842000 audit[5349]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde860ce0 a2=3 a3=1 items=0 ppid=1 pid=5349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:38.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:38.845056 sshd[5349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:38.850059 systemd[1]: Started session-13.scope. Apr 12 18:33:38.850393 systemd-logind[1300]: New session 13 of user core. Apr 12 18:33:38.853000 audit[5349]: USER_START pid=5349 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:38.855000 audit[5351]: CRED_ACQ pid=5351 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:39.585000 audit[4753]: AVC avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:33:39.585000 audit[4753]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010b14c0 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:33:39.585000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:33:39.988878 sshd[5349]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:39.988000 audit[5349]: USER_END pid=5349 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:39.989000 audit[5349]: CRED_DISP pid=5349 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:39.992127 systemd[1]: sshd@10-10.200.20.38:22-10.200.12.6:57116.service: Deactivated successfully. Apr 12 18:33:39.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:57116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:39.993031 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:33:39.993740 systemd-logind[1300]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:33:39.994860 systemd-logind[1300]: Removed session 13. Apr 12 18:33:40.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:40.061494 systemd[1]: Started sshd@11-10.200.20.38:22-10.200.12.6:57128.service. Apr 12 18:33:40.239000 audit[4794]: AVC avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:33:40.239000 audit[4794]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005bb9a0 a2=fc6 a3=0 items=0 ppid=4689 pid=4794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 key=(null) Apr 12 18:33:40.239000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:33:40.470000 audit[5361]: USER_ACCT pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.472027 sshd[5361]: Accepted publickey for core from 10.200.12.6 port 57128 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:40.471000 audit[5361]: CRED_ACQ pid=5361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.471000 audit[5361]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4e9e300 a2=3 a3=1 items=0 ppid=1 pid=5361 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:40.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:40.473892 sshd[5361]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:40.479002 systemd[1]: Started session-14.scope. Apr 12 18:33:40.479931 systemd-logind[1300]: New session 14 of user core. Apr 12 18:33:40.482000 audit[5361]: USER_START pid=5361 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.484000 audit[5363]: CRED_ACQ pid=5363 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.844754 sshd[5361]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:40.844000 audit[5361]: USER_END pid=5361 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.844000 audit[5361]: CRED_DISP pid=5361 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:40.847584 systemd[1]: sshd@11-10.200.20.38:22-10.200.12.6:57128.service: Deactivated successfully. Apr 12 18:33:40.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:57128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:40.848712 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:33:40.849902 systemd-logind[1300]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:33:40.850999 systemd-logind[1300]: Removed session 14. Apr 12 18:33:45.912856 systemd[1]: Started sshd@12-10.200.20.38:22-10.200.12.6:55912.service. Apr 12 18:33:45.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:45.919479 kernel: kauditd_printk_skb: 29 callbacks suppressed Apr 12 18:33:45.919557 kernel: audit: type=1130 audit(1712946825.912:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:46.321000 audit[5382]: USER_ACCT pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.321836 sshd[5382]: Accepted publickey for core from 10.200.12.6 port 55912 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:46.345619 kernel: audit: type=1101 audit(1712946826.321:1505): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.346319 sshd[5382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:46.345000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.372643 systemd[1]: Started session-15.scope. Apr 12 18:33:46.374183 systemd-logind[1300]: New session 15 of user core. Apr 12 18:33:46.383209 kernel: audit: type=1103 audit(1712946826.345:1506): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.383389 kernel: audit: type=1006 audit(1712946826.345:1507): pid=5382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:33:46.345000 audit[5382]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd43593e0 a2=3 a3=1 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:46.419629 kernel: audit: type=1300 audit(1712946826.345:1507): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd43593e0 a2=3 a3=1 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.419733 kernel: audit: type=1327 audit(1712946826.345:1507): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:46.378000 audit[5382]: USER_START pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.446579 kernel: audit: type=1105 audit(1712946826.378:1508): pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.380000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.468248 kernel: audit: type=1103 audit(1712946826.380:1509): pid=5384 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.700750 sshd[5382]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:46.701000 audit[5382]: USER_END pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.704728 systemd-logind[1300]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:33:46.706304 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:33:46.707853 systemd-logind[1300]: Removed session 15. Apr 12 18:33:46.708686 systemd[1]: sshd@12-10.200.20.38:22-10.200.12.6:55912.service: Deactivated successfully. Apr 12 18:33:46.702000 audit[5382]: CRED_DISP pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.749982 kernel: audit: type=1106 audit(1712946826.701:1510): pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.750131 kernel: audit: type=1104 audit(1712946826.702:1511): pid=5382 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:46.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:55912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:51.770125 systemd[1]: Started sshd@13-10.200.20.38:22-10.200.12.6:55924.service. Apr 12 18:33:51.797493 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:51.797621 kernel: audit: type=1130 audit(1712946831.768:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:55924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:51.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:55924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:52.172000 audit[5420]: USER_ACCT pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.175067 sshd[5420]: Accepted publickey for core from 10.200.12.6 port 55924 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:52.198351 sshd[5420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:52.198757 kernel: audit: type=1101 audit(1712946832.172:1514): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.196000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.203990 systemd[1]: Started session-16.scope. Apr 12 18:33:52.205259 systemd-logind[1300]: New session 16 of user core. Apr 12 18:33:52.238604 kernel: audit: type=1103 audit(1712946832.196:1515): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.238760 kernel: audit: type=1006 audit(1712946832.196:1516): pid=5420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:33:52.196000 audit[5420]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5241410 a2=3 a3=1 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.262257 kernel: audit: type=1300 audit(1712946832.196:1516): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5241410 a2=3 a3=1 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:52.196000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:52.272614 kernel: audit: type=1327 audit(1712946832.196:1516): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:52.205000 audit[5420]: USER_START pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.303200 kernel: audit: type=1105 audit(1712946832.205:1517): pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.210000 audit[5422]: CRED_ACQ pid=5422 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.325268 kernel: audit: type=1103 audit(1712946832.210:1518): pid=5422 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.543744 sshd[5420]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:52.543000 audit[5420]: USER_END pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.547543 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:33:52.548467 systemd[1]: sshd@13-10.200.20.38:22-10.200.12.6:55924.service: Deactivated successfully. Apr 12 18:33:52.544000 audit[5420]: CRED_DISP pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.592145 kernel: audit: type=1106 audit(1712946832.543:1519): pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.592300 kernel: audit: type=1104 audit(1712946832.544:1520): pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:52.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:55924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:52.592712 systemd-logind[1300]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:33:52.593531 systemd-logind[1300]: Removed session 16. Apr 12 18:33:57.616973 systemd[1]: Started sshd@14-10.200.20.38:22-10.200.12.6:46350.service. Apr 12 18:33:57.644268 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:57.644352 kernel: audit: type=1130 audit(1712946837.615:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:46350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:57.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:46350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:58.051000 audit[5461]: USER_ACCT pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.053724 sshd[5461]: Accepted publickey for core from 10.200.12.6 port 46350 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:58.057297 sshd[5461]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:58.055000 audit[5461]: CRED_ACQ pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.099297 kernel: audit: type=1101 audit(1712946838.051:1523): pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.099428 kernel: audit: type=1103 audit(1712946838.055:1524): pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.114656 kernel: audit: type=1006 audit(1712946838.055:1525): pid=5461 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:33:58.104129 systemd-logind[1300]: New session 17 of user core. Apr 12 18:33:58.114049 systemd[1]: Started session-17.scope. Apr 12 18:33:58.055000 audit[5461]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2756290 a2=3 a3=1 items=0 ppid=1 pid=5461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.140956 kernel: audit: type=1300 audit(1712946838.055:1525): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2756290 a2=3 a3=1 items=0 ppid=1 pid=5461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.055000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:58.149599 kernel: audit: type=1327 audit(1712946838.055:1525): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:58.140000 audit[5461]: USER_START pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.175151 kernel: audit: type=1105 audit(1712946838.140:1526): pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.140000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.196383 kernel: audit: type=1103 audit(1712946838.140:1527): pid=5463 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.505468 sshd[5461]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:58.506000 audit[5461]: USER_END pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.509111 systemd-logind[1300]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:33:58.510430 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:33:58.511682 systemd-logind[1300]: Removed session 17. Apr 12 18:33:58.512489 systemd[1]: sshd@14-10.200.20.38:22-10.200.12.6:46350.service: Deactivated successfully. Apr 12 18:33:58.506000 audit[5461]: CRED_DISP pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.556885 kernel: audit: type=1106 audit(1712946838.506:1528): pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.557025 kernel: audit: type=1104 audit(1712946838.506:1529): pid=5461 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:46350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:58.574450 systemd[1]: Started sshd@15-10.200.20.38:22-10.200.12.6:46364.service. Apr 12 18:33:58.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.38:22-10.200.12.6:46364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:58.979872 sshd[5472]: Accepted publickey for core from 10.200.12.6 port 46364 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:58.979000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.982047 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:58.981000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.981000 audit[5472]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcadd13f0 a2=3 a3=1 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:58.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:58.987554 systemd[1]: Started session-18.scope. Apr 12 18:33:58.987723 systemd-logind[1300]: New session 18 of user core. Apr 12 18:33:58.992000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:58.994000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.415728 sshd[5472]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:59.416000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.416000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.419049 systemd[1]: sshd@15-10.200.20.38:22-10.200.12.6:46364.service: Deactivated successfully. Apr 12 18:33:59.419919 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:33:59.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.38:22-10.200.12.6:46364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:59.420939 systemd-logind[1300]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:33:59.421967 systemd-logind[1300]: Removed session 18. Apr 12 18:33:59.484472 systemd[1]: Started sshd@16-10.200.20.38:22-10.200.12.6:46378.service. Apr 12 18:33:59.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.38:22-10.200.12.6:46378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:59.886000 audit[5482]: USER_ACCT pid=5482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.886973 sshd[5482]: Accepted publickey for core from 10.200.12.6 port 46378 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:33:59.887000 audit[5482]: CRED_ACQ pid=5482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.887000 audit[5482]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecd90f10 a2=3 a3=1 items=0 ppid=1 pid=5482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:59.887000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:59.888889 sshd[5482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:59.893700 systemd[1]: Started session-19.scope. Apr 12 18:33:59.895468 systemd-logind[1300]: New session 19 of user core. Apr 12 18:33:59.899000 audit[5482]: USER_START pid=5482 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:59.900000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.084000 audit[5497]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.084000 audit[5497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff45e4e90 a2=0 a3=1 items=0 ppid=2619 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.086000 audit[5497]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.086000 audit[5497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff45e4e90 a2=0 a3=1 items=0 ppid=2619 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.121000 audit[5499]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.121000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff09eec70 a2=0 a3=1 items=0 ppid=2619 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.123000 audit[5499]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:01.123000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff09eec70 a2=0 a3=1 items=0 ppid=2619 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:01.137789 sshd[5482]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:01.139000 audit[5482]: USER_END pid=5482 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.139000 audit[5482]: CRED_DISP pid=5482 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.38:22-10.200.12.6:46378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:01.141427 systemd[1]: sshd@16-10.200.20.38:22-10.200.12.6:46378.service: Deactivated successfully. Apr 12 18:34:01.142302 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:34:01.143461 systemd-logind[1300]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:34:01.144580 systemd-logind[1300]: Removed session 19. Apr 12 18:34:01.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.38:22-10.200.12.6:46384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:01.204897 systemd[1]: Started sshd@17-10.200.20.38:22-10.200.12.6:46384.service. Apr 12 18:34:01.610906 sshd[5503]: Accepted publickey for core from 10.200.12.6 port 46384 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:01.610000 audit[5503]: USER_ACCT pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.612887 sshd[5503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:01.611000 audit[5503]: CRED_ACQ pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.612000 audit[5503]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd192fd0 a2=3 a3=1 items=0 ppid=1 pid=5503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:01.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:01.617762 systemd-logind[1300]: New session 20 of user core. Apr 12 18:34:01.618407 systemd[1]: Started session-20.scope. Apr 12 18:34:01.622000 audit[5503]: USER_START pid=5503 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:01.623000 audit[5505]: CRED_ACQ pid=5505 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.100458 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.9D2d0g.mount: Deactivated successfully. Apr 12 18:34:02.192625 sshd[5503]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:02.193000 audit[5503]: USER_END pid=5503 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.193000 audit[5503]: CRED_DISP pid=5503 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.195717 systemd[1]: sshd@17-10.200.20.38:22-10.200.12.6:46384.service: Deactivated successfully. Apr 12 18:34:02.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.38:22-10.200.12.6:46384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:02.196611 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:34:02.197275 systemd-logind[1300]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:34:02.198058 systemd-logind[1300]: Removed session 20. Apr 12 18:34:02.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.38:22-10.200.12.6:46390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:02.261175 systemd[1]: Started sshd@18-10.200.20.38:22-10.200.12.6:46390.service. Apr 12 18:34:02.671959 sshd[5533]: Accepted publickey for core from 10.200.12.6 port 46390 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:02.671000 audit[5533]: USER_ACCT pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.677807 kernel: kauditd_printk_skb: 47 callbacks suppressed Apr 12 18:34:02.677959 kernel: audit: type=1101 audit(1712946842.671:1563): pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.679019 sshd[5533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:02.677000 audit[5533]: CRED_ACQ pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.705914 systemd[1]: Started session-21.scope. Apr 12 18:34:02.707568 systemd-logind[1300]: New session 21 of user core. Apr 12 18:34:02.722901 kernel: audit: type=1103 audit(1712946842.677:1564): pid=5533 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.737699 kernel: audit: type=1006 audit(1712946842.677:1565): pid=5533 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:34:02.737921 kernel: audit: type=1300 audit(1712946842.677:1565): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc891c800 a2=3 a3=1 items=0 ppid=1 pid=5533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:02.677000 audit[5533]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc891c800 a2=3 a3=1 items=0 ppid=1 pid=5533 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:02.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:02.770121 kernel: audit: type=1327 audit(1712946842.677:1565): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:02.770294 kernel: audit: type=1105 audit(1712946842.711:1566): pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.711000 audit[5533]: USER_START pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.799341 kernel: audit: type=1103 audit(1712946842.711:1567): pid=5535 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:02.711000 audit[5535]: CRED_ACQ pid=5535 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:03.029334 sshd[5533]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:03.029000 audit[5533]: USER_END pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:03.034430 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:34:03.035070 systemd[1]: sshd@18-10.200.20.38:22-10.200.12.6:46390.service: Deactivated successfully. Apr 12 18:34:03.036935 systemd-logind[1300]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:34:03.037821 systemd-logind[1300]: Removed session 21. Apr 12 18:34:03.032000 audit[5533]: CRED_DISP pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:03.076440 kernel: audit: type=1106 audit(1712946843.029:1568): pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:03.076606 kernel: audit: type=1104 audit(1712946843.032:1569): pid=5533 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:03.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.38:22-10.200.12.6:46390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:03.098690 kernel: audit: type=1131 audit(1712946843.034:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.38:22-10.200.12.6:46390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:04.933938 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.nKvdBz.mount: Deactivated successfully. Apr 12 18:34:05.923619 systemd[1]: run-containerd-runc-k8s.io-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67-runc.khMWTj.mount: Deactivated successfully. Apr 12 18:34:07.079000 audit[5592]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.079000 audit[5592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffee4aa900 a2=0 a3=1 items=0 ppid=2619 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:07.081000 audit[5592]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:07.081000 audit[5592]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffee4aa900 a2=0 a3=1 items=0 ppid=2619 pid=5592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:07.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:08.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:50508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:08.097920 systemd[1]: Started sshd@19-10.200.20.38:22-10.200.12.6:50508.service. Apr 12 18:34:08.103108 kernel: kauditd_printk_skb: 6 callbacks suppressed Apr 12 18:34:08.103218 kernel: audit: type=1130 audit(1712946848.096:1573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:50508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:08.503000 audit[5595]: USER_ACCT pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.511762 sshd[5595]: Accepted publickey for core from 10.200.12.6 port 50508 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:08.513710 sshd[5595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:08.518979 systemd[1]: Started session-22.scope. Apr 12 18:34:08.520562 systemd-logind[1300]: New session 22 of user core. Apr 12 18:34:08.530535 kernel: audit: type=1101 audit(1712946848.503:1574): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.530658 kernel: audit: type=1103 audit(1712946848.511:1575): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.511000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.571752 kernel: audit: type=1006 audit(1712946848.511:1576): pid=5595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:34:08.511000 audit[5595]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9725910 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:08.596808 kernel: audit: type=1300 audit(1712946848.511:1576): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9725910 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:08.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:08.524000 audit[5595]: USER_START pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.633648 kernel: audit: type=1327 audit(1712946848.511:1576): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:08.633795 kernel: audit: type=1105 audit(1712946848.524:1577): pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.526000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.655937 kernel: audit: type=1103 audit(1712946848.526:1578): pid=5597 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.918490 sshd[5595]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:08.918000 audit[5595]: USER_END pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.921701 systemd-logind[1300]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:34:08.922861 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:34:08.924150 systemd-logind[1300]: Removed session 22. Apr 12 18:34:08.924929 systemd[1]: sshd@19-10.200.20.38:22-10.200.12.6:50508.service: Deactivated successfully. Apr 12 18:34:08.918000 audit[5595]: CRED_DISP pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.965760 kernel: audit: type=1106 audit(1712946848.918:1579): pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.965919 kernel: audit: type=1104 audit(1712946848.918:1580): pid=5595 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:08.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:50508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:13.986091 systemd[1]: Started sshd@20-10.200.20.38:22-10.200.12.6:50522.service. Apr 12 18:34:14.013597 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:34:14.013737 kernel: audit: type=1130 audit(1712946853.984:1582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:50522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:13.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:50522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:14.386000 audit[5609]: USER_ACCT pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.388436 sshd[5609]: Accepted publickey for core from 10.200.12.6 port 50522 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:14.412569 kernel: audit: type=1101 audit(1712946854.386:1583): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.410000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.412902 sshd[5609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:14.449101 kernel: audit: type=1103 audit(1712946854.410:1584): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.449237 kernel: audit: type=1006 audit(1712946854.410:1585): pid=5609 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:34:14.449268 kernel: audit: type=1300 audit(1712946854.410:1585): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe92b79b0 a2=3 a3=1 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:14.410000 audit[5609]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe92b79b0 a2=3 a3=1 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:14.410000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:14.481947 kernel: audit: type=1327 audit(1712946854.410:1585): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:14.477417 systemd-logind[1300]: New session 23 of user core. Apr 12 18:34:14.481795 systemd[1]: Started session-23.scope. Apr 12 18:34:14.485000 audit[5609]: USER_START pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.485000 audit[5623]: CRED_ACQ pid=5623 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.534205 kernel: audit: type=1105 audit(1712946854.485:1586): pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.534330 kernel: audit: type=1103 audit(1712946854.485:1587): pid=5623 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.794467 sshd[5609]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:14.794000 audit[5609]: USER_END pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.824647 systemd[1]: sshd@20-10.200.20.38:22-10.200.12.6:50522.service: Deactivated successfully. Apr 12 18:34:14.825478 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:34:14.827370 systemd-logind[1300]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:34:14.828249 systemd-logind[1300]: Removed session 23. Apr 12 18:34:14.794000 audit[5609]: CRED_DISP pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.850838 kernel: audit: type=1106 audit(1712946854.794:1588): pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.850958 kernel: audit: type=1104 audit(1712946854.794:1589): pid=5609 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:14.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:50522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:19.465000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.470542 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:34:19.470595 kernel: audit: type=1400 audit(1712946859.465:1591): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.465000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40151ce720 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.520540 kernel: audit: type=1300 audit(1712946859.465:1591): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40151ce720 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.544955 kernel: audit: type=1327 audit(1712946859.465:1591): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.545080 kernel: audit: type=1400 audit(1712946859.466:1592): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.466000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.466000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4013f8c8a0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.595292 kernel: audit: type=1300 audit(1712946859.466:1592): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4013f8c8a0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.619164 kernel: audit: type=1327 audit(1712946859.466:1592): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.619286 kernel: audit: type=1400 audit(1712946859.470:1593): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.470000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.470000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4013f8c900 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.669326 kernel: audit: type=1300 audit(1712946859.470:1593): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4013f8c900 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.693639 kernel: audit: type=1327 audit(1712946859.470:1593): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.472000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.715775 kernel: audit: type=1400 audit(1712946859.472:1594): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.472000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400d43c8c0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.478000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.478000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400d43c900 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.478000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.478000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40151ce900 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:34:19.478000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:19.863974 systemd[1]: Started sshd@21-10.200.20.38:22-10.200.12.6:52454.service. Apr 12 18:34:19.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.38:22-10.200.12.6:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:19.930000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.930000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020ed0e0 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:19.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:19.931000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:19.931000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400215cc90 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:19.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:20.270000 audit[5641]: USER_ACCT pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.271674 sshd[5641]: Accepted publickey for core from 10.200.12.6 port 52454 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:20.272000 audit[5641]: CRED_ACQ pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.272000 audit[5641]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd75d1d30 a2=3 a3=1 items=0 ppid=1 pid=5641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:20.272000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:20.273097 sshd[5641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:20.277929 systemd[1]: Started session-24.scope. Apr 12 18:34:20.278252 systemd-logind[1300]: New session 24 of user core. Apr 12 18:34:20.282000 audit[5641]: USER_START pid=5641 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.284000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.644428 sshd[5641]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:20.645000 audit[5641]: USER_END pid=5641 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.645000 audit[5641]: CRED_DISP pid=5641 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:20.648124 systemd[1]: sshd@21-10.200.20.38:22-10.200.12.6:52454.service: Deactivated successfully. Apr 12 18:34:20.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.38:22-10.200.12.6:52454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:20.648985 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:34:20.650160 systemd-logind[1300]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:34:20.650944 systemd-logind[1300]: Removed session 24. Apr 12 18:34:24.409000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:24.409000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020ed860 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:24.409000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:24.409000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400297e500 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:24.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:24.418000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:24.418000 audit[2309]: AVC avc: denied { watch } for pid=2309 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:24.418000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020ed880 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:24.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:24.418000 audit[2309]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400297e920 a2=fc6 a3=0 items=0 ppid=2187 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:34:24.418000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:25.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:45108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:25.713127 systemd[1]: Started sshd@22-10.200.20.38:22-10.200.12.6:45108.service. Apr 12 18:34:25.718305 kernel: kauditd_printk_skb: 37 callbacks suppressed Apr 12 18:34:25.718401 kernel: audit: type=1130 audit(1712946865.711:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:45108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:26.117000 audit[5659]: USER_ACCT pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.119081 sshd[5659]: Accepted publickey for core from 10.200.12.6 port 45108 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:26.121335 sshd[5659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:26.119000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.142661 kernel: audit: type=1101 audit(1712946866.117:1613): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.142717 kernel: audit: type=1103 audit(1712946866.119:1614): pid=5659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.180014 kernel: audit: type=1006 audit(1712946866.119:1615): pid=5659 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:34:26.181638 kernel: audit: type=1300 audit(1712946866.119:1615): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff19b570 a2=3 a3=1 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.119000 audit[5659]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff19b570 a2=3 a3=1 items=0 ppid=1 pid=5659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.180766 systemd-logind[1300]: New session 25 of user core. Apr 12 18:34:26.181299 systemd[1]: Started session-25.scope. Apr 12 18:34:26.119000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:26.212863 kernel: audit: type=1327 audit(1712946866.119:1615): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:26.212000 audit[5659]: USER_START pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.240563 kernel: audit: type=1105 audit(1712946866.212:1616): pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.239000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.262521 kernel: audit: type=1103 audit(1712946866.239:1617): pid=5661 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.562449 sshd[5659]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:26.561000 audit[5659]: USER_END pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.566204 systemd-logind[1300]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:34:26.567563 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:34:26.568736 systemd-logind[1300]: Removed session 25. Apr 12 18:34:26.569516 systemd[1]: sshd@22-10.200.20.38:22-10.200.12.6:45108.service: Deactivated successfully. Apr 12 18:34:26.561000 audit[5659]: CRED_DISP pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.610080 kernel: audit: type=1106 audit(1712946866.561:1618): pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.610230 kernel: audit: type=1104 audit(1712946866.561:1619): pid=5659 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:26.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:45108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:27.228177 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.RyBR8f.mount: Deactivated successfully. Apr 12 18:34:31.639251 systemd[1]: Started sshd@23-10.200.20.38:22-10.200.12.6:45118.service. Apr 12 18:34:31.667595 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:34:31.667732 kernel: audit: type=1130 audit(1712946871.637:1621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:31.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:32.047000 audit[5689]: USER_ACCT pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.048998 sshd[5689]: Accepted publickey for core from 10.200.12.6 port 45118 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:32.050889 sshd[5689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:32.049000 audit[5689]: CRED_ACQ pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.094456 kernel: audit: type=1101 audit(1712946872.047:1622): pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.094615 kernel: audit: type=1103 audit(1712946872.049:1623): pid=5689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.112710 kernel: audit: type=1006 audit(1712946872.049:1624): pid=5689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:34:32.144814 kernel: audit: type=1300 audit(1712946872.049:1624): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc39f6400 a2=3 a3=1 items=0 ppid=1 pid=5689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.049000 audit[5689]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc39f6400 a2=3 a3=1 items=0 ppid=1 pid=5689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:32.144192 systemd-logind[1300]: New session 26 of user core. Apr 12 18:34:32.049000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:32.149761 systemd[1]: Started session-26.scope. Apr 12 18:34:32.156960 kernel: audit: type=1327 audit(1712946872.049:1624): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:32.173000 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.NkGfrC.mount: Deactivated successfully. Apr 12 18:34:32.178000 audit[5689]: USER_START pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.205000 audit[5707]: CRED_ACQ pid=5707 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.229443 kernel: audit: type=1105 audit(1712946872.178:1625): pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.229579 kernel: audit: type=1103 audit(1712946872.205:1626): pid=5707 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.510450 sshd[5689]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:32.510000 audit[5689]: USER_END pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.510000 audit[5689]: CRED_DISP pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.537477 systemd[1]: sshd@23-10.200.20.38:22-10.200.12.6:45118.service: Deactivated successfully. Apr 12 18:34:32.538345 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:34:32.558311 kernel: audit: type=1106 audit(1712946872.510:1627): pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.558447 kernel: audit: type=1104 audit(1712946872.510:1628): pid=5689 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:32.558405 systemd-logind[1300]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:34:32.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:32.559527 systemd-logind[1300]: Removed session 26. Apr 12 18:34:34.930995 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.j8y6GW.mount: Deactivated successfully. Apr 12 18:34:35.924872 systemd[1]: run-containerd-runc-k8s.io-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67-runc.msJIT4.mount: Deactivated successfully. Apr 12 18:34:37.591108 systemd[1]: Started sshd@24-10.200.20.38:22-10.200.12.6:37062.service. Apr 12 18:34:37.618077 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:34:37.618227 kernel: audit: type=1130 audit(1712946877.590:1630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.38:22-10.200.12.6:37062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:37.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.38:22-10.200.12.6:37062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:37.991000 audit[5765]: USER_ACCT pid=5765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:37.993935 sshd[5765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:38.003055 sshd[5765]: Accepted publickey for core from 10.200.12.6 port 37062 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:37.993000 audit[5765]: CRED_ACQ pid=5765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.044283 kernel: audit: type=1101 audit(1712946877.991:1631): pid=5765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.044415 kernel: audit: type=1103 audit(1712946877.993:1632): pid=5765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.023603 systemd-logind[1300]: New session 27 of user core. Apr 12 18:34:38.059594 kernel: audit: type=1006 audit(1712946877.993:1633): pid=5765 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:34:38.049088 systemd[1]: Started session-27.scope. Apr 12 18:34:37.993000 audit[5765]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb0feeb0 a2=3 a3=1 items=0 ppid=1 pid=5765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:38.084425 kernel: audit: type=1300 audit(1712946877.993:1633): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb0feeb0 a2=3 a3=1 items=0 ppid=1 pid=5765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:37.993000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:38.093222 kernel: audit: type=1327 audit(1712946877.993:1633): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:38.084000 audit[5765]: USER_START pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.120611 kernel: audit: type=1105 audit(1712946878.084:1634): pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.084000 audit[5767]: CRED_ACQ pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.142147 kernel: audit: type=1103 audit(1712946878.084:1635): pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.386575 sshd[5765]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:38.388000 audit[5765]: USER_END pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.390214 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:34:38.390848 systemd[1]: sshd@24-10.200.20.38:22-10.200.12.6:37062.service: Deactivated successfully. Apr 12 18:34:38.393172 systemd-logind[1300]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:34:38.394114 systemd-logind[1300]: Removed session 27. Apr 12 18:34:38.388000 audit[5765]: CRED_DISP pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.437450 kernel: audit: type=1106 audit(1712946878.388:1636): pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.437624 kernel: audit: type=1104 audit(1712946878.388:1637): pid=5765 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:38.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.38:22-10.200.12.6:37062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:39.587000 audit[4753]: AVC avc: denied { watch } for pid=4753 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.1708019441/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c146,c234 tclass=file permissive=0 Apr 12 18:34:39.587000 audit[4753]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010b0de0 a2=fc6 a3=0 items=0 ppid=4642 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c146,c234 key=(null) Apr 12 18:34:39.587000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:40.242000 audit[4794]: AVC avc: denied { watch } for pid=4794 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_31_34.62786801/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c557,c974 tclass=file permissive=0 Apr 12 18:34:40.242000 audit[4794]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005bab60 a2=fc6 a3=0 items=0 ppid=4689 pid=4794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c557,c974 key=(null) Apr 12 18:34:40.242000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:43.459932 systemd[1]: Started sshd@25-10.200.20.38:22-10.200.12.6:37078.service. Apr 12 18:34:43.488112 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:34:43.488173 kernel: audit: type=1130 audit(1712946883.459:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:37078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:43.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:37078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:43.871000 audit[5778]: USER_ACCT pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:43.874928 sshd[5778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:34:43.876316 sshd[5778]: Accepted publickey for core from 10.200.12.6 port 37078 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:34:43.872000 audit[5778]: CRED_ACQ pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:43.918370 kernel: audit: type=1101 audit(1712946883.871:1642): pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:43.918449 kernel: audit: type=1103 audit(1712946883.872:1643): pid=5778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:43.932643 kernel: audit: type=1006 audit(1712946883.872:1644): pid=5778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Apr 12 18:34:43.872000 audit[5778]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd41d1850 a2=3 a3=1 items=0 ppid=1 pid=5778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:43.957441 kernel: audit: type=1300 audit(1712946883.872:1644): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd41d1850 a2=3 a3=1 items=0 ppid=1 pid=5778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:43.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:43.965886 kernel: audit: type=1327 audit(1712946883.872:1644): proctitle=737368643A20636F7265205B707269765D Apr 12 18:34:43.967800 systemd-logind[1300]: New session 28 of user core. Apr 12 18:34:43.968435 systemd[1]: Started session-28.scope. Apr 12 18:34:43.973000 audit[5778]: USER_START pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.000000 audit[5780]: CRED_ACQ pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.023110 kernel: audit: type=1105 audit(1712946883.973:1645): pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.023236 kernel: audit: type=1103 audit(1712946884.000:1646): pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.308230 sshd[5778]: pam_unix(sshd:session): session closed for user core Apr 12 18:34:44.308000 audit[5778]: USER_END pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.311315 systemd[1]: session-28.scope: Deactivated successfully. Apr 12 18:34:44.312212 systemd[1]: sshd@25-10.200.20.38:22-10.200.12.6:37078.service: Deactivated successfully. Apr 12 18:34:44.309000 audit[5778]: CRED_DISP pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.356617 kernel: audit: type=1106 audit(1712946884.308:1647): pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.356734 kernel: audit: type=1104 audit(1712946884.309:1648): pid=5778 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:34:44.356812 systemd-logind[1300]: Session 28 logged out. Waiting for processes to exit. Apr 12 18:34:44.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:37078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:34:44.357813 systemd-logind[1300]: Removed session 28. Apr 12 18:34:49.135037 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.ZyCAuq.mount: Deactivated successfully. Apr 12 18:34:57.228749 systemd[1]: run-containerd-runc-k8s.io-d771c1721c0e8e0f181515a475ed87cb02388b1edc44bc65ea8b00a1d1f9ac12-runc.OZ6JyN.mount: Deactivated successfully. Apr 12 18:34:58.207187 systemd[1]: cri-containerd-62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff.scope: Deactivated successfully. Apr 12 18:34:58.207526 systemd[1]: cri-containerd-62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff.scope: Consumed 5.627s CPU time. Apr 12 18:34:58.205000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:34:58.212525 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:34:58.212613 kernel: audit: type=1334 audit(1712946898.205:1650): prog-id=124 op=UNLOAD Apr 12 18:34:58.220000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:34:58.230572 kernel: audit: type=1334 audit(1712946898.220:1651): prog-id=127 op=UNLOAD Apr 12 18:34:58.241939 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff-rootfs.mount: Deactivated successfully. Apr 12 18:34:58.244983 env[1313]: time="2024-04-12T18:34:58.244935031Z" level=info msg="shim disconnected" id=62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff Apr 12 18:34:58.245367 env[1313]: time="2024-04-12T18:34:58.245342885Z" level=warning msg="cleaning up after shim disconnected" id=62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff namespace=k8s.io Apr 12 18:34:58.245451 env[1313]: time="2024-04-12T18:34:58.245438249Z" level=info msg="cleaning up dead shim" Apr 12 18:34:58.252811 env[1313]: time="2024-04-12T18:34:58.252771429Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:34:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5850 runtime=io.containerd.runc.v2\n" Apr 12 18:34:58.721690 kubelet[2440]: I0412 18:34:58.721664 2440 scope.go:117] "RemoveContainer" containerID="62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff" Apr 12 18:34:58.724249 env[1313]: time="2024-04-12T18:34:58.724207173Z" level=info msg="CreateContainer within sandbox \"35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:34:58.756606 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount648598708.mount: Deactivated successfully. Apr 12 18:34:58.773926 env[1313]: time="2024-04-12T18:34:58.773861416Z" level=info msg="CreateContainer within sandbox \"35d9fbd44217eebe2d08cfc07d62211b63033f5f64e452bb425268ef0639fdfb\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0\"" Apr 12 18:34:58.774622 env[1313]: time="2024-04-12T18:34:58.774592962Z" level=info msg="StartContainer for \"61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0\"" Apr 12 18:34:58.794753 systemd[1]: Started cri-containerd-61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0.scope. Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.845140 kernel: audit: type=1400 audit(1712946898.808:1652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.845278 kernel: audit: type=1400 audit(1712946898.808:1653): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.862439 kernel: audit: type=1400 audit(1712946898.808:1654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.880064 kernel: audit: type=1400 audit(1712946898.808:1655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.897305 kernel: audit: type=1400 audit(1712946898.808:1656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.914919 kernel: audit: type=1400 audit(1712946898.808:1657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.932118 kernel: audit: type=1400 audit(1712946898.808:1658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.933536 kernel: audit: type=1400 audit(1712946898.808:1659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit: BPF prog-id=203 op=LOAD Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2522 pid=5871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:58.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616463663266386337386438623334666363373438376336356665 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2522 pid=5871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:58.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616463663266386337386438623334666363373438376336356665 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.808000 audit: BPF prog-id=204 op=LOAD Apr 12 18:34:58.808000 audit[5871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2522 pid=5871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:58.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616463663266386337386438623334666363373438376336356665 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit: BPF prog-id=205 op=LOAD Apr 12 18:34:58.826000 audit[5871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2522 pid=5871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616463663266386337386438623334666363373438376336356665 Apr 12 18:34:58.826000 audit: BPF prog-id=205 op=UNLOAD Apr 12 18:34:58.826000 audit: BPF prog-id=204 op=UNLOAD Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { perfmon } for pid=5871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit[5871]: AVC avc: denied { bpf } for pid=5871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:58.826000 audit: BPF prog-id=206 op=LOAD Apr 12 18:34:58.826000 audit[5871]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2522 pid=5871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:58.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616463663266386337386438623334666363373438376336356665 Apr 12 18:34:58.959442 env[1313]: time="2024-04-12T18:34:58.959393886Z" level=info msg="StartContainer for \"61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0\" returns successfully" Apr 12 18:34:59.116630 systemd[1]: cri-containerd-0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877.scope: Deactivated successfully. Apr 12 18:34:59.116952 systemd[1]: cri-containerd-0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877.scope: Consumed 4.571s CPU time. Apr 12 18:34:59.122000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:34:59.122000 audit: BPF prog-id=99 op=UNLOAD Apr 12 18:34:59.144317 env[1313]: time="2024-04-12T18:34:59.144269451Z" level=info msg="shim disconnected" id=0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877 Apr 12 18:34:59.144607 env[1313]: time="2024-04-12T18:34:59.144575142Z" level=warning msg="cleaning up after shim disconnected" id=0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877 namespace=k8s.io Apr 12 18:34:59.144703 env[1313]: time="2024-04-12T18:34:59.144689066Z" level=info msg="cleaning up dead shim" Apr 12 18:34:59.152156 env[1313]: time="2024-04-12T18:34:59.152114088Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:34:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5912 runtime=io.containerd.runc.v2\n" Apr 12 18:34:59.242037 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877-rootfs.mount: Deactivated successfully. Apr 12 18:34:59.725538 kubelet[2440]: I0412 18:34:59.725389 2440 scope.go:117] "RemoveContainer" containerID="0d779130c3505f277f5e5436e4b65ce3cde33edf8391e9db84e5d1f8f14e8877" Apr 12 18:34:59.728406 env[1313]: time="2024-04-12T18:34:59.728353989Z" level=info msg="CreateContainer within sandbox \"d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:34:59.758198 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4035177375.mount: Deactivated successfully. Apr 12 18:34:59.784354 env[1313]: time="2024-04-12T18:34:59.784293479Z" level=info msg="CreateContainer within sandbox \"d6a0518cdc5532a78b2d088b9ebd5feae3079d730018a0a745c5cc677317043c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"3f840a7050fabe5fd32d5601fe8b223e6d85fd9afaf8ca7a5055fc4d4339be8c\"" Apr 12 18:34:59.785036 env[1313]: time="2024-04-12T18:34:59.785005424Z" level=info msg="StartContainer for \"3f840a7050fabe5fd32d5601fe8b223e6d85fd9afaf8ca7a5055fc4d4339be8c\"" Apr 12 18:34:59.804637 systemd[1]: Started cri-containerd-3f840a7050fabe5fd32d5601fe8b223e6d85fd9afaf8ca7a5055fc4d4339be8c.scope. Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit: BPF prog-id=207 op=LOAD Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2187 pid=5932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:59.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383430613730353066616265356664333264353630316665386232 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2187 pid=5932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:59.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383430613730353066616265356664333264353630316665386232 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit: BPF prog-id=208 op=LOAD Apr 12 18:34:59.821000 audit[5932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2187 pid=5932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:59.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383430613730353066616265356664333264353630316665386232 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.821000 audit: BPF prog-id=209 op=LOAD Apr 12 18:34:59.821000 audit[5932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2187 pid=5932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:59.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383430613730353066616265356664333264353630316665386232 Apr 12 18:34:59.821000 audit: BPF prog-id=209 op=UNLOAD Apr 12 18:34:59.822000 audit: BPF prog-id=208 op=UNLOAD Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { perfmon } for pid=5932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit[5932]: AVC avc: denied { bpf } for pid=5932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:59.822000 audit: BPF prog-id=210 op=LOAD Apr 12 18:34:59.822000 audit[5932]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2187 pid=5932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:59.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366383430613730353066616265356664333264353630316665386232 Apr 12 18:34:59.850040 env[1313]: time="2024-04-12T18:34:59.849958193Z" level=info msg="StartContainer for \"3f840a7050fabe5fd32d5601fe8b223e6d85fd9afaf8ca7a5055fc4d4339be8c\" returns successfully" Apr 12 18:35:00.438819 kubelet[2440]: E0412 18:35:00.438788 2440 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:53962->10.200.20.14:2379: read: connection timed out" Apr 12 18:35:00.443691 systemd[1]: cri-containerd-d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6.scope: Deactivated successfully. Apr 12 18:35:00.444005 systemd[1]: cri-containerd-d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6.scope: Consumed 2.545s CPU time. Apr 12 18:35:00.446000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:35:00.446000 audit: BPF prog-id=98 op=UNLOAD Apr 12 18:35:00.465803 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6-rootfs.mount: Deactivated successfully. Apr 12 18:35:00.467278 env[1313]: time="2024-04-12T18:35:00.467223408Z" level=info msg="shim disconnected" id=d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6 Apr 12 18:35:00.467278 env[1313]: time="2024-04-12T18:35:00.467276850Z" level=warning msg="cleaning up after shim disconnected" id=d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6 namespace=k8s.io Apr 12 18:35:00.467459 env[1313]: time="2024-04-12T18:35:00.467287770Z" level=info msg="cleaning up dead shim" Apr 12 18:35:00.483431 env[1313]: time="2024-04-12T18:35:00.482926277Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:35:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5975 runtime=io.containerd.runc.v2\n" Apr 12 18:35:00.734836 kubelet[2440]: I0412 18:35:00.733953 2440 scope.go:117] "RemoveContainer" containerID="d7fd3ea11f43a666b39eaae2744dd75773aff16d2e1bacdb61cf10c686ac5cf6" Apr 12 18:35:00.736970 env[1313]: time="2024-04-12T18:35:00.736934514Z" level=info msg="CreateContainer within sandbox \"75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:35:00.784834 env[1313]: time="2024-04-12T18:35:00.784776386Z" level=info msg="CreateContainer within sandbox \"75ae48f103c34ff08e9d3e6c5ff06b1033876ac6950af8658180eccd36ae15ca\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"04adef8f7eb3afcedecd41d205e5387ab5f968dc1b50b85d78bd53257b71133e\"" Apr 12 18:35:00.785428 env[1313]: time="2024-04-12T18:35:00.785403848Z" level=info msg="StartContainer for \"04adef8f7eb3afcedecd41d205e5387ab5f968dc1b50b85d78bd53257b71133e\"" Apr 12 18:35:00.807419 systemd[1]: Started cri-containerd-04adef8f7eb3afcedecd41d205e5387ab5f968dc1b50b85d78bd53257b71133e.scope. Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.824000 audit: BPF prog-id=211 op=LOAD Apr 12 18:35:00.825000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.825000 audit[5997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2135 pid=5997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:00.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616465663866376562336166636564656364343164323035653533 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2135 pid=5997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:00.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616465663866376562336166636564656364343164323035653533 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.826000 audit: BPF prog-id=212 op=LOAD Apr 12 18:35:00.826000 audit[5997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2135 pid=5997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:00.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616465663866376562336166636564656364343164323035653533 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit: BPF prog-id=213 op=LOAD Apr 12 18:35:00.827000 audit[5997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2135 pid=5997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:00.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616465663866376562336166636564656364343164323035653533 Apr 12 18:35:00.827000 audit: BPF prog-id=213 op=UNLOAD Apr 12 18:35:00.827000 audit: BPF prog-id=212 op=UNLOAD Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { perfmon } for pid=5997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit[5997]: AVC avc: denied { bpf } for pid=5997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:35:00.827000 audit: BPF prog-id=214 op=LOAD Apr 12 18:35:00.827000 audit[5997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2135 pid=5997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:35:00.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034616465663866376562336166636564656364343164323035653533 Apr 12 18:35:00.859453 env[1313]: time="2024-04-12T18:35:00.859404794Z" level=info msg="StartContainer for \"04adef8f7eb3afcedecd41d205e5387ab5f968dc1b50b85d78bd53257b71133e\" returns successfully" Apr 12 18:35:01.662000 audit[5943]: AVC avc: denied { watch } for pid=5943 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:01.662000 audit[5943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400085c000 a2=fc6 a3=0 items=0 ppid=2187 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:35:01.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:01.663000 audit[5943]: AVC avc: denied { watch } for pid=5943 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:01.663000 audit[5943]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004ee200 a2=fc6 a3=0 items=0 ppid=2187 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c353,c899 key=(null) Apr 12 18:35:01.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:02.110101 systemd[1]: run-containerd-runc-k8s.io-d9ab0c50abcbbf207c8fbd050b2e724c89cefdc8722de3469cb316903a8dfd4b-runc.PMwLqN.mount: Deactivated successfully. Apr 12 18:35:04.274456 kubelet[2440]: E0412 18:35:04.274322 2440 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.3-a-2842bd657c.17c59c1fd43068d6", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.3-a-2842bd657c", UID:"7180fa0e291540bfae8ba9d20f4bdd76", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.3-a-2842bd657c"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 34, 53, 802203350, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 34, 53, 802203350, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.3-a-2842bd657c"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:53806->10.200.20.14:2379: read: connection timed out' (will not retry!) Apr 12 18:35:04.934687 systemd[1]: run-containerd-runc-k8s.io-f5a776352c08081dff3e16a367f2189d358638bae06932294fd1de7e42de73f6-runc.ak32l5.mount: Deactivated successfully. Apr 12 18:35:05.923466 systemd[1]: run-containerd-runc-k8s.io-79cab566aea5799c1a2879a4de7e3411fdb709aad50e682f9da899245f272b67-runc.uYTFLF.mount: Deactivated successfully. Apr 12 18:35:09.202872 kubelet[2440]: I0412 18:35:09.202816 2440 status_manager.go:853] "Failed to get status for pod" podUID="e4858b5c-abdd-473f-a425-98ecb65f45cc" pod="tigera-operator/tigera-operator-6bfc79cb9c-nphz5" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:53896->10.200.20.14:2379: read: connection timed out" Apr 12 18:35:10.439429 kubelet[2440]: E0412 18:35:10.439389 2440 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:10.485000 audit: BPF prog-id=203 op=UNLOAD Apr 12 18:35:10.485417 systemd[1]: cri-containerd-61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0.scope: Deactivated successfully. Apr 12 18:35:10.490953 kernel: kauditd_printk_skb: 173 callbacks suppressed Apr 12 18:35:10.491097 kernel: audit: type=1334 audit(1712946910.485:1712): prog-id=203 op=UNLOAD Apr 12 18:35:10.498997 kernel: audit: type=1334 audit(1712946910.498:1713): prog-id=206 op=UNLOAD Apr 12 18:35:10.498000 audit: BPF prog-id=206 op=UNLOAD Apr 12 18:35:10.518916 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0-rootfs.mount: Deactivated successfully. Apr 12 18:35:10.609015 env[1313]: time="2024-04-12T18:35:10.608965350Z" level=info msg="shim disconnected" id=61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0 Apr 12 18:35:10.609565 env[1313]: time="2024-04-12T18:35:10.609536969Z" level=warning msg="cleaning up after shim disconnected" id=61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0 namespace=k8s.io Apr 12 18:35:10.609652 env[1313]: time="2024-04-12T18:35:10.609638172Z" level=info msg="cleaning up dead shim" Apr 12 18:35:10.617750 env[1313]: time="2024-04-12T18:35:10.617709793Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:35:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6108 runtime=io.containerd.runc.v2\n" Apr 12 18:35:10.756418 kubelet[2440]: I0412 18:35:10.755786 2440 scope.go:117] "RemoveContainer" containerID="62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff" Apr 12 18:35:10.756418 kubelet[2440]: I0412 18:35:10.756143 2440 scope.go:117] "RemoveContainer" containerID="61adcf2f8c78d8b34fcc7487c65fee4eacde751afad905bb6c06724f9ef891d0" Apr 12 18:35:10.756787 kubelet[2440]: E0412 18:35:10.756474 2440 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-6bfc79cb9c-nphz5_tigera-operator(e4858b5c-abdd-473f-a425-98ecb65f45cc)\"" pod="tigera-operator/tigera-operator-6bfc79cb9c-nphz5" podUID="e4858b5c-abdd-473f-a425-98ecb65f45cc" Apr 12 18:35:10.758471 env[1313]: time="2024-04-12T18:35:10.758418387Z" level=info msg="RemoveContainer for \"62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff\"" Apr 12 18:35:10.767399 env[1313]: time="2024-04-12T18:35:10.767346396Z" level=info msg="RemoveContainer for \"62946fff7a8ce62bbe315d99872abdfca713fa583498cf8f50230606b95f69ff\" returns successfully" Apr 12 18:35:19.465000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.465000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.511216 kernel: audit: type=1400 audit(1712946919.465:1714): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521000 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.511374 kernel: audit: type=1400 audit(1712946919.465:1715): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.465000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=400b30f230 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.538618 kernel: audit: type=1300 audit(1712946919.465:1715): arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=400b30f230 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.562821 kernel: audit: type=1327 audit(1712946919.465:1715): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.562946 kernel: audit: type=1300 audit(1712946919.465:1714): arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400adc3920 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.465000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400adc3920 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.613818 kernel: audit: type=1327 audit(1712946919.465:1714): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.465000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.636826 kernel: audit: type=1400 audit(1712946919.465:1716): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.636957 kernel: audit: type=1300 audit(1712946919.465:1716): arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400adc3950 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.465000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400adc3950 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.689821 kernel: audit: type=1327 audit(1712946919.465:1716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.471000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.711789 kernel: audit: type=1400 audit(1712946919.471:1717): avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.471000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400cb567e0 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.476000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.476000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400adc3a70 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:19.476000 audit[2267]: AVC avc: denied { watch } for pid=2267 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:19.476000 audit[2267]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=14 a1=400cb56820 a2=fc6 a3=0 items=0 ppid=2134 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c798 key=(null) Apr 12 18:35:19.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:20.439756 kubelet[2440]: E0412 18:35:20.439724 2440 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-2842bd657c?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:35:20.642406 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.659525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.675440 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.692529 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.708693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.725603 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.725893 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.743850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.744111 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.761304 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.778894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.779290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.779405 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.797150 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.797457 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.814906 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.815201 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.832538 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.832782 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.850737 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.851002 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.876070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.876370 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.885546 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.885766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.902386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.902743 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.919043 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.919329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.935846 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.936073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.961927 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.962207 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:35:20.962321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#133 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001