Apr 12 18:30:53.024384 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:30:53.024405 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:30:53.024413 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Apr 12 18:30:53.024421 kernel: printk: bootconsole [pl11] enabled Apr 12 18:30:53.024426 kernel: efi: EFI v2.70 by EDK II Apr 12 18:30:53.024432 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37b33f98 Apr 12 18:30:53.024438 kernel: random: crng init done Apr 12 18:30:53.024444 kernel: ACPI: Early table checksum verification disabled Apr 12 18:30:53.024449 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Apr 12 18:30:53.024455 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024460 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024467 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Apr 12 18:30:53.024472 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024478 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024485 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024491 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024497 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024504 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024509 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Apr 12 18:30:53.024515 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Apr 12 18:30:53.024521 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Apr 12 18:30:53.024527 kernel: NUMA: Failed to initialise from firmware Apr 12 18:30:53.024533 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:30:53.024538 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Apr 12 18:30:53.024544 kernel: Zone ranges: Apr 12 18:30:53.024550 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Apr 12 18:30:53.024555 kernel: DMA32 empty Apr 12 18:30:53.024563 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:30:53.024568 kernel: Movable zone start for each node Apr 12 18:30:53.024574 kernel: Early memory node ranges Apr 12 18:30:53.024580 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Apr 12 18:30:53.024585 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Apr 12 18:30:53.024591 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Apr 12 18:30:53.024597 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Apr 12 18:30:53.024602 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Apr 12 18:30:53.024608 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Apr 12 18:30:53.024614 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Apr 12 18:30:53.024619 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Apr 12 18:30:53.024625 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Apr 12 18:30:53.024633 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Apr 12 18:30:53.024641 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Apr 12 18:30:53.024647 kernel: psci: probing for conduit method from ACPI. Apr 12 18:30:53.024653 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:30:53.024659 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:30:53.024667 kernel: psci: MIGRATE_INFO_TYPE not supported. Apr 12 18:30:53.024673 kernel: psci: SMC Calling Convention v1.4 Apr 12 18:30:53.024679 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Apr 12 18:30:53.024685 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Apr 12 18:30:53.024691 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:30:53.024697 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:30:53.024703 kernel: pcpu-alloc: [0] 0 [0] 1 Apr 12 18:30:53.024710 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:30:53.024716 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:30:53.024722 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:30:53.024728 kernel: CPU features: detected: Spectre-BHB Apr 12 18:30:53.024734 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:30:53.024742 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:30:53.024748 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:30:53.024754 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Apr 12 18:30:53.024760 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Apr 12 18:30:53.024766 kernel: Policy zone: Normal Apr 12 18:30:53.024774 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:30:53.024780 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:30:53.024786 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:30:53.024793 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:30:53.024799 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:30:53.024807 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Apr 12 18:30:53.024813 kernel: Memory: 3990264K/4194160K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 203896K reserved, 0K cma-reserved) Apr 12 18:30:53.024819 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:30:53.024825 kernel: trace event string verifier disabled Apr 12 18:30:53.024831 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:30:53.024838 kernel: rcu: RCU event tracing is enabled. Apr 12 18:30:53.024844 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:30:53.024851 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:30:53.024857 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:30:53.024863 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:30:53.024869 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:30:53.024877 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:30:53.024883 kernel: GICv3: 960 SPIs implemented Apr 12 18:30:53.024889 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:30:53.024896 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:30:53.024902 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:30:53.024907 kernel: GICv3: 16 PPIs implemented Apr 12 18:30:53.024914 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Apr 12 18:30:53.024920 kernel: ITS: No ITS available, not enabling LPIs Apr 12 18:30:53.024926 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:30:53.024932 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:30:53.024939 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:30:53.024945 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:30:53.024953 kernel: Console: colour dummy device 80x25 Apr 12 18:30:53.024960 kernel: printk: console [tty1] enabled Apr 12 18:30:53.024966 kernel: ACPI: Core revision 20210730 Apr 12 18:30:53.024973 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:30:53.024979 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:30:53.024985 kernel: LSM: Security Framework initializing Apr 12 18:30:53.024992 kernel: SELinux: Initializing. Apr 12 18:30:53.024999 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:30:53.025005 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:30:53.025013 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Apr 12 18:30:53.025019 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Apr 12 18:30:53.025025 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:30:53.025032 kernel: Remapping and enabling EFI services. Apr 12 18:30:53.025038 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:30:53.025044 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:30:53.025050 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Apr 12 18:30:53.025057 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:30:53.025063 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:30:53.025070 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:30:53.025077 kernel: SMP: Total of 2 processors activated. Apr 12 18:30:53.025083 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:30:53.025090 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Apr 12 18:30:53.025096 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:30:53.025102 kernel: CPU features: detected: CRC32 instructions Apr 12 18:30:53.025109 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:30:53.025115 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:30:53.025121 kernel: CPU features: detected: Privileged Access Never Apr 12 18:30:53.025129 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:30:53.025135 kernel: alternatives: patching kernel code Apr 12 18:30:53.025146 kernel: devtmpfs: initialized Apr 12 18:30:53.025154 kernel: KASLR enabled Apr 12 18:30:53.025161 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:30:53.025167 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:30:53.025174 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:30:53.025180 kernel: SMBIOS 3.1.0 present. Apr 12 18:30:53.025187 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/28/2023 Apr 12 18:30:53.025194 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:30:53.025202 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:30:53.025209 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:30:53.025215 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:30:53.025222 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:30:53.025229 kernel: audit: type=2000 audit(0.089:1): state=initialized audit_enabled=0 res=1 Apr 12 18:30:53.025235 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:30:53.025242 kernel: cpuidle: using governor menu Apr 12 18:30:53.025250 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:30:53.025256 kernel: ASID allocator initialised with 32768 entries Apr 12 18:30:53.025263 kernel: ACPI: bus type PCI registered Apr 12 18:30:53.025269 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:30:53.025276 kernel: Serial: AMBA PL011 UART driver Apr 12 18:30:53.025283 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:30:53.025289 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:30:53.025296 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:30:53.025303 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:30:53.025311 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:30:53.025317 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:30:53.025324 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:30:53.025331 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:30:53.027370 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:30:53.027379 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:30:53.027386 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:30:53.027394 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:30:53.027400 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:30:53.027410 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:30:53.027417 kernel: ACPI: Interpreter enabled Apr 12 18:30:53.027424 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:30:53.027431 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:30:53.027437 kernel: printk: console [ttyAMA0] enabled Apr 12 18:30:53.027444 kernel: printk: bootconsole [pl11] disabled Apr 12 18:30:53.027451 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Apr 12 18:30:53.027458 kernel: iommu: Default domain type: Translated Apr 12 18:30:53.027464 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:30:53.027472 kernel: vgaarb: loaded Apr 12 18:30:53.027479 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:30:53.027486 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:30:53.027492 kernel: PTP clock support registered Apr 12 18:30:53.027499 kernel: Registered efivars operations Apr 12 18:30:53.027506 kernel: No ACPI PMU IRQ for CPU0 Apr 12 18:30:53.027512 kernel: No ACPI PMU IRQ for CPU1 Apr 12 18:30:53.027519 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:30:53.027526 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:30:53.027534 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:30:53.027540 kernel: pnp: PnP ACPI init Apr 12 18:30:53.027547 kernel: pnp: PnP ACPI: found 0 devices Apr 12 18:30:53.027554 kernel: NET: Registered PF_INET protocol family Apr 12 18:30:53.027560 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:30:53.027567 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:30:53.027574 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:30:53.027581 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:30:53.027588 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:30:53.027596 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:30:53.027603 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:30:53.027609 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:30:53.027616 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:30:53.027622 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:30:53.027629 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Apr 12 18:30:53.027636 kernel: kvm [1]: HYP mode not available Apr 12 18:30:53.027643 kernel: Initialise system trusted keyrings Apr 12 18:30:53.027649 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:30:53.027657 kernel: Key type asymmetric registered Apr 12 18:30:53.027664 kernel: Asymmetric key parser 'x509' registered Apr 12 18:30:53.027670 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:30:53.027677 kernel: io scheduler mq-deadline registered Apr 12 18:30:53.027684 kernel: io scheduler kyber registered Apr 12 18:30:53.027690 kernel: io scheduler bfq registered Apr 12 18:30:53.027697 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:30:53.027703 kernel: thunder_xcv, ver 1.0 Apr 12 18:30:53.027710 kernel: thunder_bgx, ver 1.0 Apr 12 18:30:53.027718 kernel: nicpf, ver 1.0 Apr 12 18:30:53.027724 kernel: nicvf, ver 1.0 Apr 12 18:30:53.027851 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:30:53.027914 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:30:52 UTC (1712946652) Apr 12 18:30:53.027923 kernel: efifb: probing for efifb Apr 12 18:30:53.027930 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Apr 12 18:30:53.027936 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Apr 12 18:30:53.027943 kernel: efifb: scrolling: redraw Apr 12 18:30:53.027952 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 12 18:30:53.027959 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:30:53.027965 kernel: fb0: EFI VGA frame buffer device Apr 12 18:30:53.027972 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Apr 12 18:30:53.027979 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:30:53.027985 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:30:53.027992 kernel: Segment Routing with IPv6 Apr 12 18:30:53.027998 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:30:53.028005 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:30:53.028013 kernel: Key type dns_resolver registered Apr 12 18:30:53.028020 kernel: registered taskstats version 1 Apr 12 18:30:53.028026 kernel: Loading compiled-in X.509 certificates Apr 12 18:30:53.028033 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:30:53.028040 kernel: Key type .fscrypt registered Apr 12 18:30:53.028046 kernel: Key type fscrypt-provisioning registered Apr 12 18:30:53.028053 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:30:53.028060 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:30:53.028066 kernel: ima: No architecture policies found Apr 12 18:30:53.028074 kernel: Freeing unused kernel memory: 36352K Apr 12 18:30:53.028081 kernel: Run /init as init process Apr 12 18:30:53.028087 kernel: with arguments: Apr 12 18:30:53.028094 kernel: /init Apr 12 18:30:53.028100 kernel: with environment: Apr 12 18:30:53.028107 kernel: HOME=/ Apr 12 18:30:53.028113 kernel: TERM=linux Apr 12 18:30:53.028120 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:30:53.028128 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:30:53.028138 systemd[1]: Detected virtualization microsoft. Apr 12 18:30:53.028146 systemd[1]: Detected architecture arm64. Apr 12 18:30:53.028152 systemd[1]: Running in initrd. Apr 12 18:30:53.028159 systemd[1]: No hostname configured, using default hostname. Apr 12 18:30:53.028166 systemd[1]: Hostname set to . Apr 12 18:30:53.028173 systemd[1]: Initializing machine ID from random generator. Apr 12 18:30:53.028181 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:30:53.028189 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:30:53.028196 systemd[1]: Reached target cryptsetup.target. Apr 12 18:30:53.028203 systemd[1]: Reached target paths.target. Apr 12 18:30:53.028210 systemd[1]: Reached target slices.target. Apr 12 18:30:53.028217 systemd[1]: Reached target swap.target. Apr 12 18:30:53.028223 systemd[1]: Reached target timers.target. Apr 12 18:30:53.028231 systemd[1]: Listening on iscsid.socket. Apr 12 18:30:53.028238 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:30:53.028247 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:30:53.028254 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:30:53.028261 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:30:53.028268 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:30:53.028275 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:30:53.028283 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:30:53.028290 systemd[1]: Reached target sockets.target. Apr 12 18:30:53.028297 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:30:53.028318 systemd[1]: Finished network-cleanup.service. Apr 12 18:30:53.028327 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:30:53.028371 systemd[1]: Starting systemd-journald.service... Apr 12 18:30:53.028380 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:30:53.028387 systemd[1]: Starting systemd-resolved.service... Apr 12 18:30:53.028394 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:30:53.028405 systemd-journald[236]: Journal started Apr 12 18:30:53.028449 systemd-journald[236]: Runtime Journal (/run/log/journal/9dbc5c6b66374f55bc0933c45aa4301c) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:30:53.005485 systemd-modules-load[237]: Inserted module 'overlay' Apr 12 18:30:53.058380 systemd[1]: Started systemd-journald.service. Apr 12 18:30:53.058434 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:30:53.051060 systemd-resolved[238]: Positive Trust Anchors: Apr 12 18:30:53.101888 kernel: audit: type=1130 audit(1712946653.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.101913 kernel: Bridge firewalling registered Apr 12 18:30:53.101922 kernel: SCSI subsystem initialized Apr 12 18:30:53.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.051071 systemd-resolved[238]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:30:53.132813 kernel: audit: type=1130 audit(1712946653.109:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.051105 systemd-resolved[238]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:30:53.185880 kernel: audit: type=1130 audit(1712946653.137:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.053180 systemd-resolved[238]: Defaulting to hostname 'linux'. Apr 12 18:30:53.083361 systemd[1]: Started systemd-resolved.service. Apr 12 18:30:53.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.088499 systemd-modules-load[237]: Inserted module 'br_netfilter' Apr 12 18:30:53.132575 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:30:53.237456 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:30:53.237476 kernel: audit: type=1130 audit(1712946653.203:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.237486 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:30:53.137572 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:30:53.270382 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:30:53.270403 kernel: audit: type=1130 audit(1712946653.248:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.233485 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:30:53.249434 systemd[1]: Reached target nss-lookup.target. Apr 12 18:30:53.282531 systemd-modules-load[237]: Inserted module 'dm_multipath' Apr 12 18:30:53.287307 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:30:53.299171 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:30:53.314150 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:30:53.341437 kernel: audit: type=1130 audit(1712946653.320:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.339226 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:30:53.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.370381 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:30:53.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.379609 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:30:53.406232 kernel: audit: type=1130 audit(1712946653.353:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.406262 kernel: audit: type=1130 audit(1712946653.375:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.402307 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:30:53.418790 dracut-cmdline[256]: dracut-dracut-053 Apr 12 18:30:53.421182 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:30:53.428137 dracut-cmdline[256]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:30:53.483351 kernel: audit: type=1130 audit(1712946653.432:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.531362 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:30:53.546349 kernel: iscsi: registered transport (tcp) Apr 12 18:30:53.568133 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:30:53.568183 kernel: QLogic iSCSI HBA Driver Apr 12 18:30:53.598072 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:30:53.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:53.603693 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:30:53.656355 kernel: raid6: neonx8 gen() 13798 MB/s Apr 12 18:30:53.676346 kernel: raid6: neonx8 xor() 10838 MB/s Apr 12 18:30:53.696345 kernel: raid6: neonx4 gen() 13552 MB/s Apr 12 18:30:53.717345 kernel: raid6: neonx4 xor() 11086 MB/s Apr 12 18:30:53.737345 kernel: raid6: neonx2 gen() 12955 MB/s Apr 12 18:30:53.757347 kernel: raid6: neonx2 xor() 10573 MB/s Apr 12 18:30:53.778345 kernel: raid6: neonx1 gen() 10573 MB/s Apr 12 18:30:53.798347 kernel: raid6: neonx1 xor() 8783 MB/s Apr 12 18:30:53.819348 kernel: raid6: int64x8 gen() 6273 MB/s Apr 12 18:30:53.840345 kernel: raid6: int64x8 xor() 3543 MB/s Apr 12 18:30:53.860344 kernel: raid6: int64x4 gen() 7226 MB/s Apr 12 18:30:53.881344 kernel: raid6: int64x4 xor() 3852 MB/s Apr 12 18:30:53.902344 kernel: raid6: int64x2 gen() 6152 MB/s Apr 12 18:30:53.923344 kernel: raid6: int64x2 xor() 3322 MB/s Apr 12 18:30:53.943344 kernel: raid6: int64x1 gen() 5044 MB/s Apr 12 18:30:53.964350 kernel: raid6: int64x1 xor() 2646 MB/s Apr 12 18:30:53.964363 kernel: raid6: using algorithm neonx8 gen() 13798 MB/s Apr 12 18:30:53.973408 kernel: raid6: .... xor() 10838 MB/s, rmw enabled Apr 12 18:30:53.973417 kernel: raid6: using neon recovery algorithm Apr 12 18:30:53.992347 kernel: xor: measuring software checksum speed Apr 12 18:30:54.000794 kernel: 8regs : 17308 MB/sec Apr 12 18:30:54.000805 kernel: 32regs : 20755 MB/sec Apr 12 18:30:54.005045 kernel: arm64_neon : 27816 MB/sec Apr 12 18:30:54.005055 kernel: xor: using function: arm64_neon (27816 MB/sec) Apr 12 18:30:54.066352 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:30:54.075712 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:30:54.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:54.084000 audit: BPF prog-id=7 op=LOAD Apr 12 18:30:54.084000 audit: BPF prog-id=8 op=LOAD Apr 12 18:30:54.085082 systemd[1]: Starting systemd-udevd.service... Apr 12 18:30:54.099822 systemd-udevd[435]: Using default interface naming scheme 'v252'. Apr 12 18:30:54.105900 systemd[1]: Started systemd-udevd.service. Apr 12 18:30:54.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:54.117011 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:30:54.132262 dracut-pre-trigger[456]: rd.md=0: removing MD RAID activation Apr 12 18:30:54.160152 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:30:54.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:54.165917 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:30:54.205412 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:30:54.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:54.252357 kernel: hv_vmbus: Vmbus version:5.3 Apr 12 18:30:54.286390 kernel: hv_vmbus: registering driver hyperv_keyboard Apr 12 18:30:54.286442 kernel: hv_vmbus: registering driver hid_hyperv Apr 12 18:30:54.286452 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Apr 12 18:30:54.286462 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Apr 12 18:30:54.294356 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Apr 12 18:30:54.310371 kernel: hv_vmbus: registering driver hv_storvsc Apr 12 18:30:54.318426 kernel: scsi host0: storvsc_host_t Apr 12 18:30:54.318637 kernel: hv_vmbus: registering driver hv_netvsc Apr 12 18:30:54.318659 kernel: scsi host1: storvsc_host_t Apr 12 18:30:54.330373 kernel: scsi 1:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Apr 12 18:30:54.338372 kernel: scsi 1:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Apr 12 18:30:54.357364 kernel: sr 1:0:0:2: [sr0] scsi-1 drive Apr 12 18:30:54.357547 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:30:54.357558 kernel: sd 1:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Apr 12 18:30:54.367692 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Apr 12 18:30:54.367817 kernel: sd 1:0:0:0: [sda] Write Protect is off Apr 12 18:30:54.378835 kernel: sd 1:0:0:0: [sda] Mode Sense: 0f 00 10 00 Apr 12 18:30:54.379014 kernel: sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Apr 12 18:30:54.380356 kernel: sr 1:0:0:2: Attached scsi CD-ROM sr0 Apr 12 18:30:54.380501 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:30:54.390357 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Apr 12 18:30:54.403356 kernel: hv_netvsc 000d3a06-65ce-000d-3a06-65ce000d3a06 eth0: VF slot 1 added Apr 12 18:30:54.411369 kernel: hv_vmbus: registering driver hv_pci Apr 12 18:30:54.424093 kernel: hv_pci f0e67d3f-7816-4bf7-aca0-6c038307b698: PCI VMBus probing: Using version 0x10004 Apr 12 18:30:54.424305 kernel: hv_pci f0e67d3f-7816-4bf7-aca0-6c038307b698: PCI host bridge to bus 7816:00 Apr 12 18:30:54.438432 kernel: pci_bus 7816:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Apr 12 18:30:54.438611 kernel: pci_bus 7816:00: No busn resource found for root bus, will use [bus 00-ff] Apr 12 18:30:54.455423 kernel: pci 7816:00:02.0: [15b3:1018] type 00 class 0x020000 Apr 12 18:30:54.467488 kernel: pci 7816:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:30:54.491461 kernel: pci 7816:00:02.0: enabling Extended Tags Apr 12 18:30:54.518571 kernel: pci 7816:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7816:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Apr 12 18:30:54.518763 kernel: pci_bus 7816:00: busn_res: [bus 00-ff] end is updated to 00 Apr 12 18:30:54.518855 kernel: pci 7816:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Apr 12 18:30:54.566366 kernel: mlx5_core 7816:00:02.0: firmware version: 16.30.1284 Apr 12 18:30:54.725359 kernel: mlx5_core 7816:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Apr 12 18:30:54.785667 kernel: hv_netvsc 000d3a06-65ce-000d-3a06-65ce000d3a06 eth0: VF registering: eth1 Apr 12 18:30:54.785858 kernel: mlx5_core 7816:00:02.0 eth1: joined to eth0 Apr 12 18:30:54.804365 kernel: mlx5_core 7816:00:02.0 enP30742s1: renamed from eth1 Apr 12 18:30:54.809741 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:30:54.835362 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (494) Apr 12 18:30:54.848978 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:30:54.998675 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:30:55.027353 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:30:55.034082 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:30:55.049761 systemd[1]: Starting disk-uuid.service... Apr 12 18:30:55.069353 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:30:56.085353 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:30:56.085742 disk-uuid[563]: The operation has completed successfully. Apr 12 18:30:56.148165 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:30:56.152572 systemd[1]: Finished disk-uuid.service. Apr 12 18:30:56.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.162880 systemd[1]: Starting verity-setup.service... Apr 12 18:30:56.208720 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:30:56.386508 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:30:56.397021 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:30:56.400891 systemd[1]: Finished verity-setup.service. Apr 12 18:30:56.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.463137 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:30:56.470921 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:30:56.467471 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:30:56.468211 systemd[1]: Starting ignition-setup.service... Apr 12 18:30:56.483140 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:30:56.517357 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:30:56.517413 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:30:56.522159 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:30:56.559282 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:30:56.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.568000 audit: BPF prog-id=9 op=LOAD Apr 12 18:30:56.569383 systemd[1]: Starting systemd-networkd.service... Apr 12 18:30:56.585217 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:30:56.597599 systemd-networkd[830]: lo: Link UP Apr 12 18:30:56.597610 systemd-networkd[830]: lo: Gained carrier Apr 12 18:30:56.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.597997 systemd-networkd[830]: Enumeration completed Apr 12 18:30:56.601567 systemd[1]: Started systemd-networkd.service. Apr 12 18:30:56.601774 systemd-networkd[830]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:30:56.607100 systemd[1]: Reached target network.target. Apr 12 18:30:56.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.615970 systemd[1]: Starting iscsiuio.service... Apr 12 18:30:56.647813 iscsid[839]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:30:56.647813 iscsid[839]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:30:56.647813 iscsid[839]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:30:56.647813 iscsid[839]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:30:56.647813 iscsid[839]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:30:56.647813 iscsid[839]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:30:56.647813 iscsid[839]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:30:56.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.627609 systemd[1]: Started iscsiuio.service. Apr 12 18:30:56.642720 systemd[1]: Starting iscsid.service... Apr 12 18:30:56.651399 systemd[1]: Started iscsid.service. Apr 12 18:30:56.681183 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:30:56.730377 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:30:56.779385 kernel: mlx5_core 7816:00:02.0 enP30742s1: Link up Apr 12 18:30:56.735557 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:30:56.740606 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:30:56.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.746615 systemd[1]: Reached target remote-fs.target. Apr 12 18:30:56.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:56.760895 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:30:56.785621 systemd[1]: Finished ignition-setup.service. Apr 12 18:30:56.795480 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:30:56.805992 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:30:56.870351 kernel: hv_netvsc 000d3a06-65ce-000d-3a06-65ce000d3a06 eth0: Data path switched to VF: enP30742s1 Apr 12 18:30:56.877095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:30:56.876397 systemd-networkd[830]: enP30742s1: Link UP Apr 12 18:30:56.876577 systemd-networkd[830]: eth0: Link UP Apr 12 18:30:56.876930 systemd-networkd[830]: eth0: Gained carrier Apr 12 18:30:56.888690 systemd-networkd[830]: enP30742s1: Gained carrier Apr 12 18:30:56.903436 systemd-networkd[830]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:30:58.228487 systemd-networkd[830]: eth0: Gained IPv6LL Apr 12 18:30:59.384662 ignition[855]: Ignition 2.14.0 Apr 12 18:30:59.386633 ignition[855]: Stage: fetch-offline Apr 12 18:30:59.386709 ignition[855]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:30:59.386743 ignition[855]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:30:59.491779 ignition[855]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:30:59.491929 ignition[855]: parsed url from cmdline: "" Apr 12 18:30:59.491932 ignition[855]: no config URL provided Apr 12 18:30:59.491937 ignition[855]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:30:59.544727 kernel: kauditd_printk_skb: 18 callbacks suppressed Apr 12 18:30:59.544750 kernel: audit: type=1130 audit(1712946659.514:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.506276 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:30:59.491946 ignition[855]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:30:59.516129 systemd[1]: Starting ignition-fetch.service... Apr 12 18:30:59.491951 ignition[855]: failed to fetch config: resource requires networking Apr 12 18:30:59.492172 ignition[855]: Ignition finished successfully Apr 12 18:30:59.534299 ignition[861]: Ignition 2.14.0 Apr 12 18:30:59.534305 ignition[861]: Stage: fetch Apr 12 18:30:59.534439 ignition[861]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:30:59.534461 ignition[861]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:30:59.554351 ignition[861]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:30:59.554490 ignition[861]: parsed url from cmdline: "" Apr 12 18:30:59.554494 ignition[861]: no config URL provided Apr 12 18:30:59.554499 ignition[861]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:30:59.554510 ignition[861]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:30:59.554543 ignition[861]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Apr 12 18:30:59.571414 ignition[861]: GET result: OK Apr 12 18:30:59.571526 ignition[861]: config has been read from IMDS userdata Apr 12 18:30:59.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.619044 unknown[861]: fetched base config from "system" Apr 12 18:30:59.656076 kernel: audit: type=1130 audit(1712946659.625:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.571592 ignition[861]: parsing config with SHA512: 20063aadf60242f507b5511cfd4dfcddd7c02d2a5146e9e1238b40239566cfcf9d79ce1fe7f7acda17c1d5de15639afee1c29c7c64c17f48718facceda169d22 Apr 12 18:30:59.619052 unknown[861]: fetched base config from "system" Apr 12 18:30:59.619665 ignition[861]: fetch: fetch complete Apr 12 18:30:59.619057 unknown[861]: fetched user config from "azure" Apr 12 18:30:59.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.619671 ignition[861]: fetch: fetch passed Apr 12 18:30:59.694504 kernel: audit: type=1130 audit(1712946659.672:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.621714 systemd[1]: Finished ignition-fetch.service. Apr 12 18:30:59.619715 ignition[861]: Ignition finished successfully Apr 12 18:30:59.647408 systemd[1]: Starting ignition-kargs.service... Apr 12 18:30:59.658291 ignition[867]: Ignition 2.14.0 Apr 12 18:30:59.668500 systemd[1]: Finished ignition-kargs.service. Apr 12 18:30:59.658298 ignition[867]: Stage: kargs Apr 12 18:30:59.711526 systemd[1]: Starting ignition-disks.service... Apr 12 18:30:59.658422 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:30:59.658440 ignition[867]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:30:59.661035 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:30:59.664450 ignition[867]: kargs: kargs passed Apr 12 18:30:59.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.737554 systemd[1]: Finished ignition-disks.service. Apr 12 18:30:59.773511 kernel: audit: type=1130 audit(1712946659.747:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.664502 ignition[867]: Ignition finished successfully Apr 12 18:30:59.769397 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:30:59.724889 ignition[873]: Ignition 2.14.0 Apr 12 18:30:59.778719 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:30:59.724895 ignition[873]: Stage: disks Apr 12 18:30:59.787745 systemd[1]: Reached target local-fs.target. Apr 12 18:30:59.724995 ignition[873]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:30:59.797317 systemd[1]: Reached target sysinit.target. Apr 12 18:30:59.725012 ignition[873]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:30:59.805258 systemd[1]: Reached target basic.target. Apr 12 18:30:59.731017 ignition[873]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:30:59.815366 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:30:59.732377 ignition[873]: disks: disks passed Apr 12 18:30:59.732421 ignition[873]: Ignition finished successfully Apr 12 18:30:59.905826 systemd-fsck[881]: ROOT: clean, 612/7326000 files, 481074/7359488 blocks Apr 12 18:30:59.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.920570 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:30:59.948589 kernel: audit: type=1130 audit(1712946659.925:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:30:59.948833 systemd[1]: Mounting sysroot.mount... Apr 12 18:30:59.973357 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:30:59.974412 systemd[1]: Mounted sysroot.mount. Apr 12 18:30:59.982559 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:31:00.020004 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:31:00.024921 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 18:31:00.032872 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:31:00.032907 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:31:00.039047 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:31:00.086180 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:00.091232 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:31:00.112448 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (892) Apr 12 18:31:00.124179 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:00.124210 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:00.128854 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:00.132113 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:00.142447 initrd-setup-root[897]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:31:00.167473 initrd-setup-root[923]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:31:00.191100 initrd-setup-root[931]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:31:00.199992 initrd-setup-root[939]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:31:00.699689 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:31:00.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.724137 systemd[1]: Starting ignition-mount.service... Apr 12 18:31:00.734442 kernel: audit: type=1130 audit(1712946660.704:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.735170 systemd[1]: Starting sysroot-boot.service... Apr 12 18:31:00.739689 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:00.739793 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:31:00.769330 ignition[960]: INFO : Ignition 2.14.0 Apr 12 18:31:00.769330 ignition[960]: INFO : Stage: mount Apr 12 18:31:00.769330 ignition[960]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:00.769330 ignition[960]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:00.844034 kernel: audit: type=1130 audit(1712946660.773:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.844069 kernel: audit: type=1130 audit(1712946660.805:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:00.765146 systemd[1]: Finished sysroot-boot.service. Apr 12 18:31:00.848229 ignition[960]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:00.848229 ignition[960]: INFO : mount: mount passed Apr 12 18:31:00.848229 ignition[960]: INFO : Ignition finished successfully Apr 12 18:31:00.773646 systemd[1]: Finished ignition-mount.service. Apr 12 18:31:01.282133 coreos-metadata[891]: Apr 12 18:31:01.281 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Apr 12 18:31:01.291916 coreos-metadata[891]: Apr 12 18:31:01.291 INFO Fetch successful Apr 12 18:31:01.326500 coreos-metadata[891]: Apr 12 18:31:01.326 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Apr 12 18:31:01.350084 coreos-metadata[891]: Apr 12 18:31:01.350 INFO Fetch successful Apr 12 18:31:01.364485 coreos-metadata[891]: Apr 12 18:31:01.364 INFO wrote hostname ci-3510.3.3-a-acc6b8d17d to /sysroot/etc/hostname Apr 12 18:31:01.373767 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 18:31:01.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:01.399436 systemd[1]: Starting ignition-files.service... Apr 12 18:31:01.408793 kernel: audit: type=1130 audit(1712946661.378:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:01.408151 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:01.428602 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (971) Apr 12 18:31:01.440158 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:01.440190 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:31:01.444919 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:31:01.449422 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:01.463178 ignition[990]: INFO : Ignition 2.14.0 Apr 12 18:31:01.463178 ignition[990]: INFO : Stage: files Apr 12 18:31:01.472436 ignition[990]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:01.472436 ignition[990]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:01.472436 ignition[990]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:01.472436 ignition[990]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:31:01.472436 ignition[990]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:31:01.472436 ignition[990]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:31:01.526234 ignition[990]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:31:01.534109 ignition[990]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:31:01.534109 ignition[990]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:31:01.534109 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:01.534109 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:01.526687 unknown[990]: wrote ssh authorized keys file for user: core Apr 12 18:31:01.977473 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:31:02.132178 ignition[990]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:31:02.148851 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:02.148851 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:02.148851 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:02.446995 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:31:02.676926 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:02.688135 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:02.688135 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:31:03.092513 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:31:03.353383 ignition[990]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:31:03.371425 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:03.371425 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:03.371425 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:31:03.572258 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:31:03.877176 ignition[990]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: b303598f3a65bbc366a7bfb4632d3b5cdd2d41b8a7973de80a99f8b1bb058299b57dc39b17a53eb7a54f1a0479ae4e2093fec675f1baff4613e14e0ed9d65c21 Apr 12 18:31:03.895391 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:03.895391 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:03.895391 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:31:03.947798 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:31:04.249795 ignition[990]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 3e6beeb7794aa002604f0be43af0255e707846760508ebe98006ec72ae8d7a7cf2c14fd52bbcc5084f0e9366b992dc64341b1da646f1ce6e937fb762f880dc15 Apr 12 18:31:04.266095 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:04.266095 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:04.266095 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:31:04.303357 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:31:04.947179 ignition[990]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: ded47d757fac0279b1b784756fb54b3a5cb0180ce45833838b00d6d7c87578a985e4627503dd7ff734e5f577cf4752ae7daaa2b68e5934fd4617ea15e995f91b Apr 12 18:31:04.964667 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:04.964667 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:04.964667 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:04.964667 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:05.017385 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (993) Apr 12 18:31:05.016867 systemd[1]: mnt-oem2066072547.mount: Deactivated successfully. Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2066072547" Apr 12 18:31:05.022723 ignition[990]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2066072547": device or resource busy Apr 12 18:31:05.022723 ignition[990]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2066072547", trying btrfs: device or resource busy Apr 12 18:31:05.022723 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2066072547" Apr 12 18:31:05.344354 kernel: audit: type=1130 audit(1712946665.059:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344381 kernel: audit: type=1130 audit(1712946665.130:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344391 kernel: audit: type=1131 audit(1712946665.145:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344401 kernel: audit: type=1130 audit(1712946665.177:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344411 kernel: audit: type=1130 audit(1712946665.267:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344420 kernel: audit: type=1131 audit(1712946665.298:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2066072547" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2066072547" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2066072547" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3495824800" Apr 12 18:31:05.344575 ignition[990]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3495824800": device or resource busy Apr 12 18:31:05.344575 ignition[990]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3495824800", trying btrfs: device or resource busy Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3495824800" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3495824800" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3495824800" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3495824800" Apr 12 18:31:05.344575 ignition[990]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:31:05.344575 ignition[990]: INFO : files: op(17): [started] processing unit "waagent.service" Apr 12 18:31:05.344575 ignition[990]: INFO : files: op(17): [finished] processing unit "waagent.service" Apr 12 18:31:05.603819 kernel: audit: type=1130 audit(1712946665.388:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.603853 kernel: audit: type=1131 audit(1712946665.512:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.036741 systemd[1]: mnt-oem3495824800.mount: Deactivated successfully. Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(18): [started] processing unit "nvidia.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(18): [finished] processing unit "nvidia.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(20): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:05.614766 ignition[990]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:05.924617 kernel: audit: type=1131 audit(1712946665.699:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.924646 kernel: audit: type=1131 audit(1712946665.756:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.045369 systemd[1]: Finished ignition-files.service. Apr 12 18:31:05.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.932563 ignition[990]: INFO : files: op(22): [started] setting preset to enabled for "waagent.service" Apr 12 18:31:05.932563 ignition[990]: INFO : files: op(22): [finished] setting preset to enabled for "waagent.service" Apr 12 18:31:05.932563 ignition[990]: INFO : files: op(23): [started] setting preset to enabled for "nvidia.service" Apr 12 18:31:05.932563 ignition[990]: INFO : files: op(23): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:31:05.932563 ignition[990]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:05.932563 ignition[990]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:05.932563 ignition[990]: INFO : files: files passed Apr 12 18:31:05.932563 ignition[990]: INFO : Ignition finished successfully Apr 12 18:31:05.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.022933 initrd-setup-root-after-ignition[1015]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:31:05.062254 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:31:05.089601 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:31:05.090391 systemd[1]: Starting ignition-quench.service... Apr 12 18:31:05.105697 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:31:06.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.105800 systemd[1]: Finished ignition-quench.service. Apr 12 18:31:05.148771 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:31:05.178190 systemd[1]: Reached target ignition-complete.target. Apr 12 18:31:06.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.105262 ignition[1028]: INFO : Ignition 2.14.0 Apr 12 18:31:06.105262 ignition[1028]: INFO : Stage: umount Apr 12 18:31:06.105262 ignition[1028]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:31:06.105262 ignition[1028]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Apr 12 18:31:06.105262 ignition[1028]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Apr 12 18:31:06.105262 ignition[1028]: INFO : umount: umount passed Apr 12 18:31:06.105262 ignition[1028]: INFO : Ignition finished successfully Apr 12 18:31:06.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.222225 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:31:05.252797 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:31:06.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.252895 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:31:06.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.298797 systemd[1]: Reached target initrd-fs.target. Apr 12 18:31:06.204000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:31:05.331855 systemd[1]: Reached target initrd.target. Apr 12 18:31:06.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.348684 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:31:06.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.349579 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:31:06.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.374560 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:31:06.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.429999 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:31:06.280779 kernel: hv_netvsc 000d3a06-65ce-000d-3a06-65ce000d3a06 eth0: Data path switched from VF: enP30742s1 Apr 12 18:31:06.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.453788 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:31:06.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:06.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.461702 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:31:05.479055 systemd[1]: Stopped target timers.target. Apr 12 18:31:05.497073 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:31:05.497154 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:31:05.542032 systemd[1]: Stopped target initrd.target. Apr 12 18:31:05.554988 systemd[1]: Stopped target basic.target. Apr 12 18:31:05.569656 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:31:05.585606 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:31:05.597285 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:31:05.608768 systemd[1]: Stopped target remote-fs.target. Apr 12 18:31:06.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.619386 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:31:06.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.630994 systemd[1]: Stopped target sysinit.target. Apr 12 18:31:05.641786 systemd[1]: Stopped target local-fs.target. Apr 12 18:31:05.653315 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:31:06.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:05.671496 systemd[1]: Stopped target swap.target. Apr 12 18:31:05.687624 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:31:05.687692 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:31:05.725211 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:31:05.741488 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:31:05.741550 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:31:05.782344 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:31:06.422226 systemd-journald[236]: Received SIGTERM from PID 1 (systemd). Apr 12 18:31:06.422258 iscsid[839]: iscsid shutting down. Apr 12 18:31:05.782398 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:31:05.795145 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:31:05.795190 systemd[1]: Stopped ignition-files.service. Apr 12 18:31:05.810596 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 18:31:05.810635 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 18:31:05.834181 systemd[1]: Stopping ignition-mount.service... Apr 12 18:31:05.849515 systemd[1]: Stopping iscsiuio.service... Apr 12 18:31:05.855642 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:31:05.868673 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:31:05.868741 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:31:05.874904 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:31:05.874958 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:31:05.890943 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:31:05.891062 systemd[1]: Stopped iscsiuio.service. Apr 12 18:31:05.902648 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:31:05.902730 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:31:05.916612 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:31:05.916703 systemd[1]: Stopped ignition-mount.service. Apr 12 18:31:05.928676 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:31:05.928717 systemd[1]: Stopped ignition-disks.service. Apr 12 18:31:05.936826 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:31:05.936864 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:31:05.948613 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:31:05.948649 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:31:05.960861 systemd[1]: Stopped target network.target. Apr 12 18:31:05.972693 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:31:05.972744 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:31:05.985557 systemd[1]: Stopped target paths.target. Apr 12 18:31:06.008924 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:31:06.012368 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:31:06.017836 systemd[1]: Stopped target slices.target. Apr 12 18:31:06.026949 systemd[1]: Stopped target sockets.target. Apr 12 18:31:06.039552 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:31:06.039584 systemd[1]: Closed iscsid.socket. Apr 12 18:31:06.048317 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:31:06.048362 systemd[1]: Closed iscsiuio.socket. Apr 12 18:31:06.062371 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:31:06.062410 systemd[1]: Stopped ignition-setup.service. Apr 12 18:31:06.071814 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:31:06.080637 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:31:06.088694 systemd-networkd[830]: eth0: DHCPv6 lease lost Apr 12 18:31:06.422000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:31:06.090149 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:31:06.090238 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:31:06.099962 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:31:06.099998 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:31:06.110125 systemd[1]: Stopping network-cleanup.service... Apr 12 18:31:06.122012 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:31:06.122081 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:31:06.146530 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:31:06.146592 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:31:06.161958 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:31:06.161999 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:31:06.168916 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:31:06.178722 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:31:06.179179 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:31:06.179278 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:31:06.187380 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:31:06.187499 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:31:06.197498 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:31:06.197549 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:31:06.205638 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:31:06.205671 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:31:06.210524 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:31:06.210572 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:31:06.218920 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:31:06.218962 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:31:06.227664 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:31:06.227704 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:31:06.240137 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:31:06.248596 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:31:06.248656 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:31:06.254054 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:31:06.254094 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:31:06.265809 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:31:06.265851 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:31:06.277737 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:31:06.278204 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:31:06.278330 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:31:06.295575 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:31:06.328851 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:31:06.328961 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:31:06.338479 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:31:06.338524 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:31:06.358633 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:31:06.358722 systemd[1]: Stopped network-cleanup.service. Apr 12 18:31:06.364847 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:31:06.374605 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:31:06.391584 systemd[1]: Switching root. Apr 12 18:31:06.424499 systemd-journald[236]: Journal stopped Apr 12 18:31:17.305116 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:31:17.305138 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:31:17.305149 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:31:17.305159 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:31:17.305167 kernel: SELinux: policy capability open_perms=1 Apr 12 18:31:17.305176 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:31:17.305185 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:31:17.305193 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:31:17.305202 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:31:17.305210 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:31:17.305221 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:31:17.305231 systemd[1]: Successfully loaded SELinux policy in 302.893ms. Apr 12 18:31:17.305242 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.722ms. Apr 12 18:31:17.305252 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:17.305264 systemd[1]: Detected virtualization microsoft. Apr 12 18:31:17.305274 systemd[1]: Detected architecture arm64. Apr 12 18:31:17.305283 systemd[1]: Detected first boot. Apr 12 18:31:17.305292 systemd[1]: Hostname set to . Apr 12 18:31:17.305301 systemd[1]: Initializing machine ID from random generator. Apr 12 18:31:17.305311 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:31:17.305319 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 18:31:17.305329 kernel: audit: type=1400 audit(1712946670.504:88): avc: denied { associate } for pid=1061 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:17.305353 kernel: audit: type=1300 audit(1712946670.504:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227fc a1=4000028ae0 a2=4000026d00 a3=32 items=0 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:17.305363 kernel: audit: type=1327 audit(1712946670.504:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:17.305373 kernel: audit: type=1400 audit(1712946670.519:89): avc: denied { associate } for pid=1061 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:17.305383 kernel: audit: type=1300 audit(1712946670.519:89): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228d9 a2=1ed a3=0 items=2 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:17.305391 kernel: audit: type=1307 audit(1712946670.519:89): cwd="/" Apr 12 18:31:17.305402 kernel: audit: type=1302 audit(1712946670.519:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:17.305411 kernel: audit: type=1302 audit(1712946670.519:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:17.305421 kernel: audit: type=1327 audit(1712946670.519:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:17.305430 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:31:17.305440 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:17.305450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:17.305461 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:17.305471 kernel: audit: type=1334 audit(1712946676.513:90): prog-id=12 op=LOAD Apr 12 18:31:17.305479 kernel: audit: type=1334 audit(1712946676.513:91): prog-id=3 op=UNLOAD Apr 12 18:31:17.305488 kernel: audit: type=1334 audit(1712946676.514:92): prog-id=13 op=LOAD Apr 12 18:31:17.305496 kernel: audit: type=1334 audit(1712946676.520:93): prog-id=14 op=LOAD Apr 12 18:31:17.305505 kernel: audit: type=1334 audit(1712946676.520:94): prog-id=4 op=UNLOAD Apr 12 18:31:17.305513 kernel: audit: type=1334 audit(1712946676.520:95): prog-id=5 op=UNLOAD Apr 12 18:31:17.305524 kernel: audit: type=1334 audit(1712946676.526:96): prog-id=15 op=LOAD Apr 12 18:31:17.305532 kernel: audit: type=1334 audit(1712946676.526:97): prog-id=12 op=UNLOAD Apr 12 18:31:17.305543 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:31:17.305551 kernel: audit: type=1334 audit(1712946676.532:98): prog-id=16 op=LOAD Apr 12 18:31:17.305560 systemd[1]: Stopped iscsid.service. Apr 12 18:31:17.305570 kernel: audit: type=1334 audit(1712946676.538:99): prog-id=17 op=LOAD Apr 12 18:31:17.305578 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:31:17.305587 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:31:17.305597 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:31:17.305608 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:31:17.305618 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:31:17.305627 systemd[1]: Created slice system-getty.slice. Apr 12 18:31:17.305638 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:31:17.305647 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:31:17.305657 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:31:17.305666 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:31:17.305675 systemd[1]: Created slice user.slice. Apr 12 18:31:17.305684 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:17.305694 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:31:17.305704 systemd[1]: Set up automount boot.automount. Apr 12 18:31:17.305713 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:31:17.305722 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:31:17.305731 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:31:17.305741 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:31:17.305750 systemd[1]: Reached target integritysetup.target. Apr 12 18:31:17.305759 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:17.305769 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:17.305779 systemd[1]: Reached target slices.target. Apr 12 18:31:17.305788 systemd[1]: Reached target swap.target. Apr 12 18:31:17.305797 systemd[1]: Reached target torcx.target. Apr 12 18:31:17.305806 systemd[1]: Reached target veritysetup.target. Apr 12 18:31:17.305816 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:31:17.305827 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:31:17.305838 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:17.305848 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:17.305857 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:17.305866 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:31:17.305876 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:31:17.305886 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:31:17.305895 systemd[1]: Mounting media.mount... Apr 12 18:31:17.305907 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:31:17.305916 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:31:17.305926 systemd[1]: Mounting tmp.mount... Apr 12 18:31:17.305935 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:31:17.305945 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:31:17.305955 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:17.305965 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:31:17.305974 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:31:17.305984 systemd[1]: Starting modprobe@drm.service... Apr 12 18:31:17.305995 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:31:17.306005 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:31:17.306015 systemd[1]: Starting modprobe@loop.service... Apr 12 18:31:17.306025 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:31:17.306035 kernel: fuse: init (API version 7.34) Apr 12 18:31:17.306045 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:31:17.306055 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:31:17.306064 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:31:17.306076 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:31:17.306085 kernel: loop: module loaded Apr 12 18:31:17.306094 systemd[1]: Stopped systemd-journald.service. Apr 12 18:31:17.306104 systemd[1]: systemd-journald.service: Consumed 3.119s CPU time. Apr 12 18:31:17.306114 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:17.306124 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:17.306134 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:31:17.306144 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:31:17.306154 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:17.306165 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:31:17.306175 systemd[1]: Stopped verity-setup.service. Apr 12 18:31:17.306184 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:31:17.306194 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:31:17.306204 systemd[1]: Mounted media.mount. Apr 12 18:31:17.306214 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:31:17.306224 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:31:17.306234 systemd[1]: Mounted tmp.mount. Apr 12 18:31:17.306243 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:31:17.306254 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:17.306264 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:31:17.306274 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:31:17.306286 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:31:17.306300 systemd-journald[1167]: Journal started Apr 12 18:31:17.306347 systemd-journald[1167]: Runtime Journal (/run/log/journal/893247869b664b72ab895e40c7cf9d0c) is 8.0M, max 78.6M, 70.6M free. Apr 12 18:31:08.546000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:31:09.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:09.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:09.294000 audit: BPF prog-id=10 op=LOAD Apr 12 18:31:09.294000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:31:09.294000 audit: BPF prog-id=11 op=LOAD Apr 12 18:31:09.294000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:31:10.504000 audit[1061]: AVC avc: denied { associate } for pid=1061 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:10.504000 audit[1061]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40000227fc a1=4000028ae0 a2=4000026d00 a3=32 items=0 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.504000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:10.519000 audit[1061]: AVC avc: denied { associate } for pid=1061 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:10.519000 audit[1061]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228d9 a2=1ed a3=0 items=2 ppid=1044 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:10.519000 audit: CWD cwd="/" Apr 12 18:31:10.519000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:10.519000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:10.519000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:16.513000 audit: BPF prog-id=12 op=LOAD Apr 12 18:31:16.513000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:31:16.514000 audit: BPF prog-id=13 op=LOAD Apr 12 18:31:16.520000 audit: BPF prog-id=14 op=LOAD Apr 12 18:31:16.520000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:31:16.520000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:31:16.526000 audit: BPF prog-id=15 op=LOAD Apr 12 18:31:16.526000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:31:16.532000 audit: BPF prog-id=16 op=LOAD Apr 12 18:31:16.538000 audit: BPF prog-id=17 op=LOAD Apr 12 18:31:16.538000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:31:16.538000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:31:16.544000 audit: BPF prog-id=18 op=LOAD Apr 12 18:31:16.544000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:31:16.550000 audit: BPF prog-id=19 op=LOAD Apr 12 18:31:16.555000 audit: BPF prog-id=20 op=LOAD Apr 12 18:31:16.555000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:31:16.555000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:31:16.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.578000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:31:16.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.131000 audit: BPF prog-id=21 op=LOAD Apr 12 18:31:17.131000 audit: BPF prog-id=22 op=LOAD Apr 12 18:31:17.131000 audit: BPF prog-id=23 op=LOAD Apr 12 18:31:17.131000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:31:17.131000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:31:17.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.302000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:31:17.302000 audit[1167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffca2e9260 a2=4000 a3=1 items=0 ppid=1 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:17.302000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:31:17.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:10.452415 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:16.512874 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:31:10.466861 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:16.556780 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:31:10.466880 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:16.557123 systemd[1]: systemd-journald.service: Consumed 3.119s CPU time. Apr 12 18:31:10.466916 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:31:10.466926 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:31:10.466962 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:31:10.466973 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:31:10.467166 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:31:10.467195 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:10.467207 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:10.492111 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:31:10.492152 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:31:10.492172 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:31:10.492186 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:31:10.492206 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:31:10.492219 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:31:15.522764 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:15.523016 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:15.523118 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:15.523271 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:15.523317 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:31:15.523384 /usr/lib/systemd/system-generators/torcx-generator[1061]: time="2024-04-12T18:31:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:31:17.309433 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:31:17.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.328204 systemd[1]: Started systemd-journald.service. Apr 12 18:31:17.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.329115 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:31:17.329255 systemd[1]: Finished modprobe@drm.service. Apr 12 18:31:17.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.334229 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:31:17.334403 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:31:17.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.339833 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:31:17.339955 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:31:17.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.344781 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:31:17.344896 systemd[1]: Finished modprobe@loop.service. Apr 12 18:31:17.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.349883 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:17.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.355288 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:31:17.361267 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:31:17.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.366780 systemd[1]: Reached target network-pre.target. Apr 12 18:31:17.372627 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:31:17.378157 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:31:17.382484 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:31:17.396670 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:31:17.402083 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:31:17.406577 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:31:17.407545 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:31:17.411981 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:31:17.413000 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:17.418069 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:31:17.424117 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:17.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.429505 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:31:17.435037 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:31:17.441015 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:31:17.458089 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:31:17.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.464897 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:31:17.466824 systemd-journald[1167]: Time spent on flushing to /var/log/journal/893247869b664b72ab895e40c7cf9d0c is 14.291ms for 1140 entries. Apr 12 18:31:17.466824 systemd-journald[1167]: System Journal (/var/log/journal/893247869b664b72ab895e40c7cf9d0c) is 8.0M, max 2.6G, 2.6G free. Apr 12 18:31:17.553409 systemd-journald[1167]: Received client request to flush runtime journal. Apr 12 18:31:17.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.525982 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:17.554291 udevadm[1181]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:31:17.554362 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:31:17.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.952624 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:31:17.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.958544 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:31:18.482319 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:31:18.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.586643 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:31:18.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.592000 audit: BPF prog-id=24 op=LOAD Apr 12 18:31:18.592000 audit: BPF prog-id=25 op=LOAD Apr 12 18:31:18.592000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:31:18.592000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:31:18.593290 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:18.610970 systemd-udevd[1186]: Using default interface naming scheme 'v252'. Apr 12 18:31:18.882058 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:18.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.893000 audit: BPF prog-id=26 op=LOAD Apr 12 18:31:18.895539 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:18.921753 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:31:18.963000 audit: BPF prog-id=27 op=LOAD Apr 12 18:31:18.963000 audit: BPF prog-id=28 op=LOAD Apr 12 18:31:18.963000 audit: BPF prog-id=29 op=LOAD Apr 12 18:31:18.964990 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:31:18.999363 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:31:19.004000 audit[1193]: AVC avc: denied { confidentiality } for pid=1193 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:31:19.029510 kernel: hv_vmbus: registering driver hv_balloon Apr 12 18:31:19.029598 kernel: hv_utils: Registering HyperV Utility Driver Apr 12 18:31:19.029618 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Apr 12 18:31:19.034219 kernel: hv_balloon: Memory hot add disabled on ARM64 Apr 12 18:31:19.034288 kernel: hv_vmbus: registering driver hv_utils Apr 12 18:31:19.042486 kernel: hv_vmbus: registering driver hyperv_fb Apr 12 18:31:19.043354 kernel: hv_utils: Heartbeat IC version 3.0 Apr 12 18:31:19.050199 kernel: hv_utils: Shutdown IC version 3.2 Apr 12 18:31:19.050460 kernel: hv_utils: TimeSync IC version 4.0 Apr 12 18:31:19.157899 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Apr 12 18:31:19.165404 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Apr 12 18:31:19.165515 systemd[1]: Started systemd-userdbd.service. Apr 12 18:31:19.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.177441 kernel: Console: switching to colour dummy device 80x25 Apr 12 18:31:19.185275 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 18:31:19.004000 audit[1193]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaeebb07a0 a1=aa2c a2=ffff957124b0 a3=aaaaeeb10010 items=12 ppid=1186 pid=1193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:19.004000 audit: CWD cwd="/" Apr 12 18:31:19.004000 audit: PATH item=0 name=(null) inode=6429 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=1 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=2 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=3 name=(null) inode=9761 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=4 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=5 name=(null) inode=9762 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=6 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=7 name=(null) inode=9763 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=8 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=9 name=(null) inode=9764 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=10 name=(null) inode=9760 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PATH item=11 name=(null) inode=9765 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:19.004000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:31:19.326873 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1187) Apr 12 18:31:19.349868 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:19.361289 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:31:19.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.367399 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:31:19.496696 systemd-networkd[1207]: lo: Link UP Apr 12 18:31:19.496998 systemd-networkd[1207]: lo: Gained carrier Apr 12 18:31:19.497488 systemd-networkd[1207]: Enumeration completed Apr 12 18:31:19.497654 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:19.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.503675 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:31:19.531275 systemd-networkd[1207]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:19.578855 kernel: mlx5_core 7816:00:02.0 enP30742s1: Link up Apr 12 18:31:19.604868 kernel: hv_netvsc 000d3a06-65ce-000d-3a06-65ce000d3a06 eth0: Data path switched to VF: enP30742s1 Apr 12 18:31:19.605752 systemd-networkd[1207]: enP30742s1: Link UP Apr 12 18:31:19.606122 systemd-networkd[1207]: eth0: Link UP Apr 12 18:31:19.606131 systemd-networkd[1207]: eth0: Gained carrier Apr 12 18:31:19.609292 systemd-networkd[1207]: enP30742s1: Gained carrier Apr 12 18:31:19.625946 systemd-networkd[1207]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:19.649368 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:19.686635 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:31:19.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.692157 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:19.698159 systemd[1]: Starting lvm2-activation.service... Apr 12 18:31:19.701966 lvm[1267]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:19.728758 systemd[1]: Finished lvm2-activation.service. Apr 12 18:31:19.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.733794 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:19.738525 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:31:19.738552 systemd[1]: Reached target local-fs.target. Apr 12 18:31:19.743096 systemd[1]: Reached target machines.target. Apr 12 18:31:19.748661 systemd[1]: Starting ldconfig.service... Apr 12 18:31:19.752524 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:31:19.752587 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:19.753633 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:31:19.758977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:31:19.765545 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:31:19.770308 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:19.770362 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:19.771369 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:31:19.783684 systemd-tmpfiles[1272]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:31:19.798440 systemd-tmpfiles[1272]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:31:19.810153 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1269 (bootctl) Apr 12 18:31:19.811214 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:31:19.976981 systemd-tmpfiles[1272]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:31:19.989856 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:31:19.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.511691 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:31:20.512292 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:31:20.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.554253 systemd-fsck[1277]: fsck.fat 4.2 (2021-01-31) Apr 12 18:31:20.554253 systemd-fsck[1277]: /dev/sda1: 236 files, 117047/258078 clusters Apr 12 18:31:20.556095 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:31:20.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.564378 systemd[1]: Mounting boot.mount... Apr 12 18:31:20.572418 systemd[1]: Mounted boot.mount. Apr 12 18:31:20.582646 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:31:20.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:20.855027 systemd-networkd[1207]: eth0: Gained IPv6LL Apr 12 18:31:20.859804 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:31:20.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.319275 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:31:21.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.325910 systemd[1]: Starting audit-rules.service... Apr 12 18:31:21.331045 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:31:21.336595 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:31:21.341000 audit: BPF prog-id=30 op=LOAD Apr 12 18:31:21.343645 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:21.348000 audit: BPF prog-id=31 op=LOAD Apr 12 18:31:21.350100 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:31:21.355471 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:31:21.388000 audit[1289]: SYSTEM_BOOT pid=1289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.392225 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:31:21.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.399794 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:31:21.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.407232 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:31:21.429452 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:31:21.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.434405 systemd[1]: Reached target time-set.target. Apr 12 18:31:21.503532 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:31:21.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.512048 systemd-resolved[1286]: Positive Trust Anchors: Apr 12 18:31:21.512276 systemd-resolved[1286]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:21.512358 systemd-resolved[1286]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:21.515518 systemd-resolved[1286]: Using system hostname 'ci-3510.3.3-a-acc6b8d17d'. Apr 12 18:31:21.516877 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:21.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.521635 systemd[1]: Reached target network.target. Apr 12 18:31:21.526328 systemd[1]: Reached target network-online.target. Apr 12 18:31:21.531665 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:21.696000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:31:21.697906 systemd-timesyncd[1288]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org). Apr 12 18:31:21.698295 systemd-timesyncd[1288]: Initial clock synchronization to Fri 2024-04-12 18:31:21.697156 UTC. Apr 12 18:31:21.698408 augenrules[1304]: No rules Apr 12 18:31:21.701395 kernel: kauditd_printk_skb: 95 callbacks suppressed Apr 12 18:31:21.701455 kernel: audit: type=1305 audit(1712946681.696:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:31:21.702212 systemd[1]: Finished audit-rules.service. Apr 12 18:31:21.696000 audit[1304]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd0ebb7c0 a2=420 a3=0 items=0 ppid=1283 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:21.735296 kernel: audit: type=1300 audit(1712946681.696:178): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd0ebb7c0 a2=420 a3=0 items=0 ppid=1283 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:21.735329 kernel: audit: type=1327 audit(1712946681.696:178): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:31:21.696000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:31:27.077835 ldconfig[1268]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:31:27.087112 systemd[1]: Finished ldconfig.service. Apr 12 18:31:27.093218 systemd[1]: Starting systemd-update-done.service... Apr 12 18:31:27.116618 systemd[1]: Finished systemd-update-done.service. Apr 12 18:31:27.121709 systemd[1]: Reached target sysinit.target. Apr 12 18:31:27.126319 systemd[1]: Started motdgen.path. Apr 12 18:31:27.130232 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:31:27.136766 systemd[1]: Started logrotate.timer. Apr 12 18:31:27.140866 systemd[1]: Started mdadm.timer. Apr 12 18:31:27.144577 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:31:27.149374 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:31:27.149409 systemd[1]: Reached target paths.target. Apr 12 18:31:27.153654 systemd[1]: Reached target timers.target. Apr 12 18:31:27.158395 systemd[1]: Listening on dbus.socket. Apr 12 18:31:27.163357 systemd[1]: Starting docker.socket... Apr 12 18:31:27.180585 systemd[1]: Listening on sshd.socket. Apr 12 18:31:27.184752 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:27.185209 systemd[1]: Listening on docker.socket. Apr 12 18:31:27.189535 systemd[1]: Reached target sockets.target. Apr 12 18:31:27.193958 systemd[1]: Reached target basic.target. Apr 12 18:31:27.198271 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:31:27.198296 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:31:27.199290 systemd[1]: Starting containerd.service... Apr 12 18:31:27.204040 systemd[1]: Starting dbus.service... Apr 12 18:31:27.208424 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:31:27.213873 systemd[1]: Starting extend-filesystems.service... Apr 12 18:31:27.220890 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:31:27.221877 systemd[1]: Starting motdgen.service... Apr 12 18:31:27.226310 systemd[1]: Started nvidia.service. Apr 12 18:31:27.231176 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:31:27.236888 systemd[1]: Starting prepare-critools.service... Apr 12 18:31:27.241870 systemd[1]: Starting prepare-helm.service... Apr 12 18:31:27.246520 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:31:27.251866 systemd[1]: Starting sshd-keygen.service... Apr 12 18:31:27.258340 systemd[1]: Starting systemd-logind.service... Apr 12 18:31:27.262504 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:27.262559 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:31:27.262973 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:31:27.264260 systemd[1]: Starting update-engine.service... Apr 12 18:31:27.271064 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:31:27.279209 jq[1334]: true Apr 12 18:31:27.279451 jq[1314]: false Apr 12 18:31:27.284032 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:31:27.284210 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:31:27.294902 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:31:27.295074 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:31:27.296527 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:31:27.296674 systemd[1]: Finished motdgen.service. Apr 12 18:31:27.305186 extend-filesystems[1315]: Found sda Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda1 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda2 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda3 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found usr Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda4 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda6 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda7 Apr 12 18:31:27.309827 extend-filesystems[1315]: Found sda9 Apr 12 18:31:27.309827 extend-filesystems[1315]: Checking size of /dev/sda9 Apr 12 18:31:27.361522 jq[1344]: true Apr 12 18:31:27.368292 env[1341]: time="2024-04-12T18:31:27.368236551Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:31:27.389348 systemd-logind[1329]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:31:27.391377 systemd-logind[1329]: New seat seat0. Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.405593946Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.405739582Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406702354Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406729553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406953266Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406971626Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406984705Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.406994225Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.407064903Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407622 env[1341]: time="2024-04-12T18:31:27.407276257Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407919 env[1341]: time="2024-04-12T18:31:27.407382494Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:27.407919 env[1341]: time="2024-04-12T18:31:27.407397773Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:31:27.407919 env[1341]: time="2024-04-12T18:31:27.407444492Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:31:27.407919 env[1341]: time="2024-04-12T18:31:27.407456332Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:31:27.414827 tar[1336]: ./ Apr 12 18:31:27.414827 tar[1336]: ./loopback Apr 12 18:31:27.417647 tar[1337]: crictl Apr 12 18:31:27.419274 tar[1338]: linux-arm64/helm Apr 12 18:31:27.421503 extend-filesystems[1315]: Old size kept for /dev/sda9 Apr 12 18:31:27.426559 extend-filesystems[1315]: Found sr0 Apr 12 18:31:27.422151 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:31:27.422336 systemd[1]: Finished extend-filesystems.service. Apr 12 18:31:27.444167 systemd[1]: Started containerd.service. Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439494761Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439533200Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439546279Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439593398Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439612318Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439626517Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.439639197Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440182301Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440205020Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440218460Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440234139Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440248099Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440360656Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:31:27.453183 env[1341]: time="2024-04-12T18:31:27.440430294Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440651887Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440677447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440690886Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440732125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440745445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440759204Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440770924Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440782564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440795243Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440808083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440819482Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.440833682Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.441010797Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.441042316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.453547 env[1341]: time="2024-04-12T18:31:27.441057676Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.454023 env[1341]: time="2024-04-12T18:31:27.441070155Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:31:27.454023 env[1341]: time="2024-04-12T18:31:27.441084915Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:31:27.454023 env[1341]: time="2024-04-12T18:31:27.441095194Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:31:27.454023 env[1341]: time="2024-04-12T18:31:27.441123754Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:31:27.454023 env[1341]: time="2024-04-12T18:31:27.441157753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.441974329Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.442039447Z" level=info msg="Connect containerd service" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.442071166Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.442663069Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.442848384Z" level=info msg="Start subscribing containerd event" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.442899782Z" level=info msg="Start recovering state" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.443038058Z" level=info msg="Start event monitor" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.443057257Z" level=info msg="Start snapshots syncer" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.443066137Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.443880954Z" level=info msg="Start streaming server" Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.443144095Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.444037549Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:31:27.454123 env[1341]: time="2024-04-12T18:31:27.444082348Z" level=info msg="containerd successfully booted in 0.076770s" Apr 12 18:31:27.470749 bash[1371]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:31:27.471451 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:31:27.522935 tar[1336]: ./bandwidth Apr 12 18:31:27.541501 dbus-daemon[1313]: [system] SELinux support is enabled Apr 12 18:31:27.541646 systemd[1]: Started dbus.service. Apr 12 18:31:27.547187 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:31:27.547215 systemd[1]: Reached target system-config.target. Apr 12 18:31:27.555944 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:31:27.555965 systemd[1]: Reached target user-config.target. Apr 12 18:31:27.562429 dbus-daemon[1313]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:31:27.563958 systemd[1]: Started systemd-logind.service. Apr 12 18:31:27.581946 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:31:27.650908 tar[1336]: ./ptp Apr 12 18:31:27.733689 tar[1336]: ./vlan Apr 12 18:31:27.800186 tar[1336]: ./host-device Apr 12 18:31:27.864780 tar[1336]: ./tuning Apr 12 18:31:27.922358 tar[1336]: ./vrf Apr 12 18:31:27.931195 update_engine[1331]: I0412 18:31:27.914783 1331 main.cc:92] Flatcar Update Engine starting Apr 12 18:31:27.980489 systemd[1]: Started update-engine.service. Apr 12 18:31:27.980794 update_engine[1331]: I0412 18:31:27.980535 1331 update_check_scheduler.cc:74] Next update check in 3m34s Apr 12 18:31:27.988061 systemd[1]: Started locksmithd.service. Apr 12 18:31:27.997452 tar[1336]: ./sbr Apr 12 18:31:28.057493 tar[1336]: ./tap Apr 12 18:31:28.135814 tar[1336]: ./dhcp Apr 12 18:31:28.206340 tar[1338]: linux-arm64/LICENSE Apr 12 18:31:28.206340 tar[1338]: linux-arm64/README.md Apr 12 18:31:28.214898 systemd[1]: Finished prepare-helm.service. Apr 12 18:31:28.272680 tar[1336]: ./static Apr 12 18:31:28.300099 tar[1336]: ./firewall Apr 12 18:31:28.343515 tar[1336]: ./macvlan Apr 12 18:31:28.364190 systemd[1]: Finished prepare-critools.service. Apr 12 18:31:28.387110 tar[1336]: ./dummy Apr 12 18:31:28.420502 tar[1336]: ./bridge Apr 12 18:31:28.456523 tar[1336]: ./ipvlan Apr 12 18:31:28.489379 tar[1336]: ./portmap Apr 12 18:31:28.520568 tar[1336]: ./host-local Apr 12 18:31:28.585739 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:31:29.754233 locksmithd[1418]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:31:30.804289 sshd_keygen[1332]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:31:30.822171 systemd[1]: Finished sshd-keygen.service. Apr 12 18:31:30.828809 systemd[1]: Starting issuegen.service... Apr 12 18:31:30.834060 systemd[1]: Started waagent.service. Apr 12 18:31:30.839137 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:31:30.839342 systemd[1]: Finished issuegen.service. Apr 12 18:31:30.845316 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:31:30.926580 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:31:30.933389 systemd[1]: Started getty@tty1.service. Apr 12 18:31:30.939252 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:31:30.944539 systemd[1]: Reached target getty.target. Apr 12 18:31:30.948859 systemd[1]: Reached target multi-user.target. Apr 12 18:31:30.956078 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:31:30.964422 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:31:30.964608 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:31:30.970923 systemd[1]: Startup finished in 714ms (kernel) + 15.438s (initrd) + 22.794s (userspace) = 38.947s. Apr 12 18:31:31.950483 login[1440]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:31:31.951910 login[1441]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 18:31:31.993123 systemd[1]: Created slice user-500.slice. Apr 12 18:31:31.994271 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:31:31.996952 systemd-logind[1329]: New session 1 of user core. Apr 12 18:31:31.999766 systemd-logind[1329]: New session 2 of user core. Apr 12 18:31:32.039683 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:31:32.041221 systemd[1]: Starting user@500.service... Apr 12 18:31:32.072536 (systemd)[1444]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:32.255111 systemd[1444]: Queued start job for default target default.target. Apr 12 18:31:32.255607 systemd[1444]: Reached target paths.target. Apr 12 18:31:32.255627 systemd[1444]: Reached target sockets.target. Apr 12 18:31:32.255638 systemd[1444]: Reached target timers.target. Apr 12 18:31:32.255648 systemd[1444]: Reached target basic.target. Apr 12 18:31:32.255745 systemd[1]: Started user@500.service. Apr 12 18:31:32.256628 systemd[1]: Started session-1.scope. Apr 12 18:31:32.257207 systemd[1]: Started session-2.scope. Apr 12 18:31:32.257920 systemd[1444]: Reached target default.target. Apr 12 18:31:32.258072 systemd[1444]: Startup finished in 179ms. Apr 12 18:31:36.884318 waagent[1437]: 2024-04-12T18:31:36.884207Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Apr 12 18:31:36.891474 waagent[1437]: 2024-04-12T18:31:36.891394Z INFO Daemon Daemon OS: flatcar 3510.3.3 Apr 12 18:31:36.896367 waagent[1437]: 2024-04-12T18:31:36.896303Z INFO Daemon Daemon Python: 3.9.16 Apr 12 18:31:36.902017 waagent[1437]: 2024-04-12T18:31:36.901939Z INFO Daemon Daemon Run daemon Apr 12 18:31:36.906860 waagent[1437]: 2024-04-12T18:31:36.906779Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.3' Apr 12 18:31:36.924266 waagent[1437]: 2024-04-12T18:31:36.924136Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:31:36.940553 waagent[1437]: 2024-04-12T18:31:36.940399Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:31:36.951411 waagent[1437]: 2024-04-12T18:31:36.951328Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:31:36.956930 waagent[1437]: 2024-04-12T18:31:36.956830Z INFO Daemon Daemon Using waagent for provisioning Apr 12 18:31:36.963160 waagent[1437]: 2024-04-12T18:31:36.963097Z INFO Daemon Daemon Activate resource disk Apr 12 18:31:36.968304 waagent[1437]: 2024-04-12T18:31:36.968242Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Apr 12 18:31:36.983365 waagent[1437]: 2024-04-12T18:31:36.983299Z INFO Daemon Daemon Found device: None Apr 12 18:31:36.988149 waagent[1437]: 2024-04-12T18:31:36.988089Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Apr 12 18:31:36.996792 waagent[1437]: 2024-04-12T18:31:36.996733Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Apr 12 18:31:37.009267 waagent[1437]: 2024-04-12T18:31:37.009205Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:31:37.015325 waagent[1437]: 2024-04-12T18:31:37.015268Z INFO Daemon Daemon Running default provisioning handler Apr 12 18:31:37.028380 waagent[1437]: 2024-04-12T18:31:37.028253Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Apr 12 18:31:37.043775 waagent[1437]: 2024-04-12T18:31:37.043647Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Apr 12 18:31:37.054920 waagent[1437]: 2024-04-12T18:31:37.053938Z INFO Daemon Daemon cloud-init is enabled: False Apr 12 18:31:37.060878 waagent[1437]: 2024-04-12T18:31:37.060789Z INFO Daemon Daemon Copying ovf-env.xml Apr 12 18:31:37.147335 waagent[1437]: 2024-04-12T18:31:37.147145Z INFO Daemon Daemon Successfully mounted dvd Apr 12 18:31:37.249624 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Apr 12 18:31:37.282241 waagent[1437]: 2024-04-12T18:31:37.282084Z INFO Daemon Daemon Detect protocol endpoint Apr 12 18:31:37.287585 waagent[1437]: 2024-04-12T18:31:37.287503Z INFO Daemon Daemon Clean protocol and wireserver endpoint Apr 12 18:31:37.293791 waagent[1437]: 2024-04-12T18:31:37.293710Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Apr 12 18:31:37.300706 waagent[1437]: 2024-04-12T18:31:37.300629Z INFO Daemon Daemon Test for route to 168.63.129.16 Apr 12 18:31:37.307213 waagent[1437]: 2024-04-12T18:31:37.307138Z INFO Daemon Daemon Route to 168.63.129.16 exists Apr 12 18:31:37.312925 waagent[1437]: 2024-04-12T18:31:37.312853Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Apr 12 18:31:37.445367 waagent[1437]: 2024-04-12T18:31:37.445239Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Apr 12 18:31:37.453048 waagent[1437]: 2024-04-12T18:31:37.453000Z INFO Daemon Daemon Wire protocol version:2012-11-30 Apr 12 18:31:37.458775 waagent[1437]: 2024-04-12T18:31:37.458698Z INFO Daemon Daemon Server preferred version:2015-04-05 Apr 12 18:31:39.139431 waagent[1437]: 2024-04-12T18:31:39.139272Z INFO Daemon Daemon Initializing goal state during protocol detection Apr 12 18:31:39.154427 waagent[1437]: 2024-04-12T18:31:39.154355Z INFO Daemon Daemon Forcing an update of the goal state.. Apr 12 18:31:39.160440 waagent[1437]: 2024-04-12T18:31:39.160378Z INFO Daemon Daemon Fetching goal state [incarnation 1] Apr 12 18:31:39.230587 waagent[1437]: 2024-04-12T18:31:39.230458Z INFO Daemon Daemon Found private key matching thumbprint B49CC4139E1AE18E4237EE918FB3F836B4FE2401 Apr 12 18:31:39.239171 waagent[1437]: 2024-04-12T18:31:39.239109Z INFO Daemon Daemon Certificate with thumbprint FB918C0D0B38EDE9AB5640C74D1CDE04D300FC62 has no matching private key. Apr 12 18:31:39.249007 waagent[1437]: 2024-04-12T18:31:39.248946Z INFO Daemon Daemon Fetch goal state completed Apr 12 18:31:39.293082 waagent[1437]: 2024-04-12T18:31:39.293024Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 6f300477-917d-442c-9de7-aaeea3b4cb3b New eTag: 10647368196293909459] Apr 12 18:31:39.304316 waagent[1437]: 2024-04-12T18:31:39.304250Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:31:39.319492 waagent[1437]: 2024-04-12T18:31:39.319430Z INFO Daemon Daemon Starting provisioning Apr 12 18:31:39.324561 waagent[1437]: 2024-04-12T18:31:39.324500Z INFO Daemon Daemon Handle ovf-env.xml. Apr 12 18:31:39.329512 waagent[1437]: 2024-04-12T18:31:39.329458Z INFO Daemon Daemon Set hostname [ci-3510.3.3-a-acc6b8d17d] Apr 12 18:31:39.364908 waagent[1437]: 2024-04-12T18:31:39.364756Z INFO Daemon Daemon Publish hostname [ci-3510.3.3-a-acc6b8d17d] Apr 12 18:31:39.371849 waagent[1437]: 2024-04-12T18:31:39.371763Z INFO Daemon Daemon Examine /proc/net/route for primary interface Apr 12 18:31:39.378906 waagent[1437]: 2024-04-12T18:31:39.378818Z INFO Daemon Daemon Primary interface is [eth0] Apr 12 18:31:39.395047 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Apr 12 18:31:39.395223 systemd[1]: Stopped systemd-networkd-wait-online.service. Apr 12 18:31:39.395281 systemd[1]: Stopping systemd-networkd-wait-online.service... Apr 12 18:31:39.395513 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:31:39.399889 systemd-networkd[1207]: eth0: DHCPv6 lease lost Apr 12 18:31:39.401371 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:31:39.401559 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:31:39.403569 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:39.429975 systemd-networkd[1488]: enP30742s1: Link UP Apr 12 18:31:39.430239 systemd-networkd[1488]: enP30742s1: Gained carrier Apr 12 18:31:39.431204 systemd-networkd[1488]: eth0: Link UP Apr 12 18:31:39.431274 systemd-networkd[1488]: eth0: Gained carrier Apr 12 18:31:39.431651 systemd-networkd[1488]: lo: Link UP Apr 12 18:31:39.431714 systemd-networkd[1488]: lo: Gained carrier Apr 12 18:31:39.432276 systemd-networkd[1488]: eth0: Gained IPv6LL Apr 12 18:31:39.432576 systemd-networkd[1488]: Enumeration completed Apr 12 18:31:39.432733 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:39.433378 systemd-networkd[1488]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:39.434594 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:31:39.443074 waagent[1437]: 2024-04-12T18:31:39.438171Z INFO Daemon Daemon Create user account if not exists Apr 12 18:31:39.444545 waagent[1437]: 2024-04-12T18:31:39.444475Z INFO Daemon Daemon User core already exists, skip useradd Apr 12 18:31:39.450586 waagent[1437]: 2024-04-12T18:31:39.450516Z INFO Daemon Daemon Configure sudoer Apr 12 18:31:39.455788 waagent[1437]: 2024-04-12T18:31:39.455721Z INFO Daemon Daemon Configure sshd Apr 12 18:31:39.459994 systemd-networkd[1488]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Apr 12 18:31:39.461245 waagent[1437]: 2024-04-12T18:31:39.461014Z INFO Daemon Daemon Deploy ssh public key. Apr 12 18:31:39.462570 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:31:40.658729 waagent[1437]: 2024-04-12T18:31:40.658657Z INFO Daemon Daemon Provisioning complete Apr 12 18:31:40.679790 waagent[1437]: 2024-04-12T18:31:40.679717Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Apr 12 18:31:40.686655 waagent[1437]: 2024-04-12T18:31:40.686581Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Apr 12 18:31:40.697541 waagent[1437]: 2024-04-12T18:31:40.697474Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Apr 12 18:31:40.998616 waagent[1497]: 2024-04-12T18:31:40.998519Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Apr 12 18:31:40.999705 waagent[1497]: 2024-04-12T18:31:40.999648Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:40.999965 waagent[1497]: 2024-04-12T18:31:40.999914Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:41.013538 waagent[1497]: 2024-04-12T18:31:41.013455Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Apr 12 18:31:41.013899 waagent[1497]: 2024-04-12T18:31:41.013830Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Apr 12 18:31:41.083828 waagent[1497]: 2024-04-12T18:31:41.083696Z INFO ExtHandler ExtHandler Found private key matching thumbprint B49CC4139E1AE18E4237EE918FB3F836B4FE2401 Apr 12 18:31:41.084262 waagent[1497]: 2024-04-12T18:31:41.084206Z INFO ExtHandler ExtHandler Certificate with thumbprint FB918C0D0B38EDE9AB5640C74D1CDE04D300FC62 has no matching private key. Apr 12 18:31:41.084572 waagent[1497]: 2024-04-12T18:31:41.084525Z INFO ExtHandler ExtHandler Fetch goal state completed Apr 12 18:31:41.100544 waagent[1497]: 2024-04-12T18:31:41.100483Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 93affb6e-c636-47af-95d8-056916da1eb1 New eTag: 10647368196293909459] Apr 12 18:31:41.101357 waagent[1497]: 2024-04-12T18:31:41.101295Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Apr 12 18:31:41.215171 waagent[1497]: 2024-04-12T18:31:41.215042Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:31:41.225319 waagent[1497]: 2024-04-12T18:31:41.225251Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1497 Apr 12 18:31:41.229183 waagent[1497]: 2024-04-12T18:31:41.229122Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:31:41.230616 waagent[1497]: 2024-04-12T18:31:41.230560Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:31:41.342686 waagent[1497]: 2024-04-12T18:31:41.342569Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:31:41.343292 waagent[1497]: 2024-04-12T18:31:41.343232Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:31:41.351236 waagent[1497]: 2024-04-12T18:31:41.351176Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:31:41.351985 waagent[1497]: 2024-04-12T18:31:41.351926Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:31:41.353301 waagent[1497]: 2024-04-12T18:31:41.353234Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Apr 12 18:31:41.354797 waagent[1497]: 2024-04-12T18:31:41.354729Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:31:41.355130 waagent[1497]: 2024-04-12T18:31:41.355054Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:41.355579 waagent[1497]: 2024-04-12T18:31:41.355507Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:41.356218 waagent[1497]: 2024-04-12T18:31:41.356153Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:31:41.356552 waagent[1497]: 2024-04-12T18:31:41.356492Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:31:41.356552 waagent[1497]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:31:41.356552 waagent[1497]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:31:41.356552 waagent[1497]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:31:41.356552 waagent[1497]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:41.356552 waagent[1497]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:41.356552 waagent[1497]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:41.358809 waagent[1497]: 2024-04-12T18:31:41.358626Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:31:41.359274 waagent[1497]: 2024-04-12T18:31:41.359192Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:41.360383 waagent[1497]: 2024-04-12T18:31:41.360303Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:41.361044 waagent[1497]: 2024-04-12T18:31:41.360971Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:31:41.361207 waagent[1497]: 2024-04-12T18:31:41.361159Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:31:41.361321 waagent[1497]: 2024-04-12T18:31:41.361280Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:31:41.362057 waagent[1497]: 2024-04-12T18:31:41.361988Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:31:41.362395 waagent[1497]: 2024-04-12T18:31:41.362332Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:31:41.363018 waagent[1497]: 2024-04-12T18:31:41.362938Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:31:41.363208 waagent[1497]: 2024-04-12T18:31:41.363144Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:31:41.363658 waagent[1497]: 2024-04-12T18:31:41.363584Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:31:41.375942 waagent[1497]: 2024-04-12T18:31:41.375872Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Apr 12 18:31:41.376704 waagent[1497]: 2024-04-12T18:31:41.376660Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:31:41.377771 waagent[1497]: 2024-04-12T18:31:41.377718Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Apr 12 18:31:41.399965 waagent[1497]: 2024-04-12T18:31:41.399801Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1488' Apr 12 18:31:41.414760 waagent[1497]: 2024-04-12T18:31:41.414697Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Apr 12 18:31:41.466146 waagent[1497]: 2024-04-12T18:31:41.466010Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:31:41.466146 waagent[1497]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:31:41.466146 waagent[1497]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:31:41.466146 waagent[1497]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:65:ce brd ff:ff:ff:ff:ff:ff Apr 12 18:31:41.466146 waagent[1497]: 3: enP30742s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:65:ce brd ff:ff:ff:ff:ff:ff\ altname enP30742p0s2 Apr 12 18:31:41.466146 waagent[1497]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:31:41.466146 waagent[1497]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:31:41.466146 waagent[1497]: 2: eth0 inet 10.200.20.10/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:31:41.466146 waagent[1497]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:31:41.466146 waagent[1497]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:31:41.466146 waagent[1497]: 2: eth0 inet6 fe80::20d:3aff:fe06:65ce/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:31:41.559755 waagent[1497]: 2024-04-12T18:31:41.559698Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.8 -- exiting Apr 12 18:31:41.700996 waagent[1437]: 2024-04-12T18:31:41.700781Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Apr 12 18:31:41.705067 waagent[1437]: 2024-04-12T18:31:41.705009Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.8 to be the latest agent Apr 12 18:31:42.916832 waagent[1526]: 2024-04-12T18:31:42.916702Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.8) Apr 12 18:31:42.917677 waagent[1526]: 2024-04-12T18:31:42.917597Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.3 Apr 12 18:31:42.917833 waagent[1526]: 2024-04-12T18:31:42.917775Z INFO ExtHandler ExtHandler Python: 3.9.16 Apr 12 18:31:42.918027 waagent[1526]: 2024-04-12T18:31:42.917969Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Apr 12 18:31:42.926589 waagent[1526]: 2024-04-12T18:31:42.926455Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.3; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Apr 12 18:31:42.927077 waagent[1526]: 2024-04-12T18:31:42.927012Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:42.927260 waagent[1526]: 2024-04-12T18:31:42.927203Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:42.941884 waagent[1526]: 2024-04-12T18:31:42.941800Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Apr 12 18:31:42.951084 waagent[1526]: 2024-04-12T18:31:42.951031Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.149 Apr 12 18:31:42.952096 waagent[1526]: 2024-04-12T18:31:42.952037Z INFO ExtHandler Apr 12 18:31:42.952243 waagent[1526]: 2024-04-12T18:31:42.952195Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: d18a7b8f-caeb-4501-9352-7f0a8059bc82 eTag: 10647368196293909459 source: Fabric] Apr 12 18:31:42.952991 waagent[1526]: 2024-04-12T18:31:42.952935Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Apr 12 18:31:42.954198 waagent[1526]: 2024-04-12T18:31:42.954137Z INFO ExtHandler Apr 12 18:31:42.954330 waagent[1526]: 2024-04-12T18:31:42.954285Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Apr 12 18:31:42.961602 waagent[1526]: 2024-04-12T18:31:42.961555Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Apr 12 18:31:42.962073 waagent[1526]: 2024-04-12T18:31:42.962019Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Apr 12 18:31:42.980742 waagent[1526]: 2024-04-12T18:31:42.980685Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Apr 12 18:31:43.045781 waagent[1526]: 2024-04-12T18:31:43.045633Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FB918C0D0B38EDE9AB5640C74D1CDE04D300FC62', 'hasPrivateKey': False} Apr 12 18:31:43.046862 waagent[1526]: 2024-04-12T18:31:43.046783Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B49CC4139E1AE18E4237EE918FB3F836B4FE2401', 'hasPrivateKey': True} Apr 12 18:31:43.047924 waagent[1526]: 2024-04-12T18:31:43.047863Z INFO ExtHandler Fetch goal state completed Apr 12 18:31:43.070333 waagent[1526]: 2024-04-12T18:31:43.070225Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.7 1 Nov 2022 (Library: OpenSSL 3.0.7 1 Nov 2022) Apr 12 18:31:43.082093 waagent[1526]: 2024-04-12T18:31:43.081992Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.8 running as process 1526 Apr 12 18:31:43.085568 waagent[1526]: 2024-04-12T18:31:43.085507Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.3', '', 'Flatcar Container Linux by Kinvolk'] Apr 12 18:31:43.087026 waagent[1526]: 2024-04-12T18:31:43.086968Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Apr 12 18:31:43.091544 waagent[1526]: 2024-04-12T18:31:43.091484Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Apr 12 18:31:43.091933 waagent[1526]: 2024-04-12T18:31:43.091875Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Apr 12 18:31:43.099149 waagent[1526]: 2024-04-12T18:31:43.099088Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Apr 12 18:31:43.099610 waagent[1526]: 2024-04-12T18:31:43.099549Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Apr 12 18:31:43.105186 waagent[1526]: 2024-04-12T18:31:43.105084Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Apr 12 18:31:43.106193 waagent[1526]: 2024-04-12T18:31:43.106129Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Apr 12 18:31:43.107711 waagent[1526]: 2024-04-12T18:31:43.107638Z INFO ExtHandler ExtHandler Starting env monitor service. Apr 12 18:31:43.108391 waagent[1526]: 2024-04-12T18:31:43.108329Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:43.108640 waagent[1526]: 2024-04-12T18:31:43.108591Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:43.109318 waagent[1526]: 2024-04-12T18:31:43.109253Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Apr 12 18:31:43.109997 waagent[1526]: 2024-04-12T18:31:43.109921Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Apr 12 18:31:43.110588 waagent[1526]: 2024-04-12T18:31:43.110521Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Apr 12 18:31:43.110871 waagent[1526]: 2024-04-12T18:31:43.110808Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Apr 12 18:31:43.110871 waagent[1526]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Apr 12 18:31:43.110871 waagent[1526]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Apr 12 18:31:43.110871 waagent[1526]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Apr 12 18:31:43.110871 waagent[1526]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:43.110871 waagent[1526]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:43.110871 waagent[1526]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Apr 12 18:31:43.111058 waagent[1526]: 2024-04-12T18:31:43.110737Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Apr 12 18:31:43.111104 waagent[1526]: 2024-04-12T18:31:43.111011Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Apr 12 18:31:43.111552 waagent[1526]: 2024-04-12T18:31:43.111480Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Apr 12 18:31:43.113720 waagent[1526]: 2024-04-12T18:31:43.113535Z INFO EnvHandler ExtHandler Configure routes Apr 12 18:31:43.114088 waagent[1526]: 2024-04-12T18:31:43.114021Z INFO EnvHandler ExtHandler Gateway:None Apr 12 18:31:43.114234 waagent[1526]: 2024-04-12T18:31:43.114189Z INFO EnvHandler ExtHandler Routes:None Apr 12 18:31:43.117514 waagent[1526]: 2024-04-12T18:31:43.117370Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Apr 12 18:31:43.117667 waagent[1526]: 2024-04-12T18:31:43.117609Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Apr 12 18:31:43.120001 waagent[1526]: 2024-04-12T18:31:43.119928Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Apr 12 18:31:43.135416 waagent[1526]: 2024-04-12T18:31:43.135277Z INFO ExtHandler ExtHandler Downloading agent manifest Apr 12 18:31:43.146900 waagent[1526]: 2024-04-12T18:31:43.146807Z INFO MonitorHandler ExtHandler Network interfaces: Apr 12 18:31:43.146900 waagent[1526]: Executing ['ip', '-a', '-o', 'link']: Apr 12 18:31:43.146900 waagent[1526]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Apr 12 18:31:43.146900 waagent[1526]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:65:ce brd ff:ff:ff:ff:ff:ff Apr 12 18:31:43.146900 waagent[1526]: 3: enP30742s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:65:ce brd ff:ff:ff:ff:ff:ff\ altname enP30742p0s2 Apr 12 18:31:43.146900 waagent[1526]: Executing ['ip', '-4', '-a', '-o', 'address']: Apr 12 18:31:43.146900 waagent[1526]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Apr 12 18:31:43.146900 waagent[1526]: 2: eth0 inet 10.200.20.10/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Apr 12 18:31:43.146900 waagent[1526]: Executing ['ip', '-6', '-a', '-o', 'address']: Apr 12 18:31:43.146900 waagent[1526]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Apr 12 18:31:43.146900 waagent[1526]: 2: eth0 inet6 fe80::20d:3aff:fe06:65ce/64 scope link \ valid_lft forever preferred_lft forever Apr 12 18:31:43.157308 waagent[1526]: 2024-04-12T18:31:43.157224Z INFO ExtHandler ExtHandler Apr 12 18:31:43.158370 waagent[1526]: 2024-04-12T18:31:43.158293Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 7bcd89d0-78e4-4ef1-bf1c-72bc199ee948 correlation 4efb52e0-abb0-461d-a7ba-01696552239c created: 2024-04-12T18:30:12.161316Z] Apr 12 18:31:43.161310 waagent[1526]: 2024-04-12T18:31:43.161237Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Apr 12 18:31:43.163458 waagent[1526]: 2024-04-12T18:31:43.163390Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 6 ms] Apr 12 18:31:43.181783 waagent[1526]: 2024-04-12T18:31:43.181693Z INFO ExtHandler ExtHandler Looking for existing remote access users. Apr 12 18:31:43.281227 waagent[1526]: 2024-04-12T18:31:43.281110Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.8 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 2BCBA5E6-024D-44C5-8602-44B87A022A1D;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Apr 12 18:31:43.415112 waagent[1526]: 2024-04-12T18:31:43.414990Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Apr 12 18:31:43.415112 waagent[1526]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.415112 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.415112 waagent[1526]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.415112 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.415112 waagent[1526]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.415112 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.415112 waagent[1526]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:31:43.415112 waagent[1526]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:31:43.415112 waagent[1526]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:31:43.422551 waagent[1526]: 2024-04-12T18:31:43.422446Z INFO EnvHandler ExtHandler Current Firewall rules: Apr 12 18:31:43.422551 waagent[1526]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.422551 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.422551 waagent[1526]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.422551 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.422551 waagent[1526]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Apr 12 18:31:43.422551 waagent[1526]: pkts bytes target prot opt in out source destination Apr 12 18:31:43.422551 waagent[1526]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Apr 12 18:31:43.422551 waagent[1526]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Apr 12 18:31:43.422551 waagent[1526]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Apr 12 18:31:43.423374 waagent[1526]: 2024-04-12T18:31:43.423328Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Apr 12 18:32:07.246683 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Apr 12 18:32:13.057870 update_engine[1331]: I0412 18:32:13.057734 1331 update_attempter.cc:509] Updating boot flags... Apr 12 18:32:19.073931 systemd[1]: Created slice system-sshd.slice. Apr 12 18:32:19.074998 systemd[1]: Started sshd@0-10.200.20.10:22-10.200.12.6:44240.service. Apr 12 18:32:19.703555 sshd[1644]: Accepted publickey for core from 10.200.12.6 port 44240 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:19.721786 sshd[1644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:19.726389 systemd[1]: Started session-3.scope. Apr 12 18:32:19.726929 systemd-logind[1329]: New session 3 of user core. Apr 12 18:32:20.082242 systemd[1]: Started sshd@1-10.200.20.10:22-10.200.12.6:44246.service. Apr 12 18:32:20.492455 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 44246 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:20.493688 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:20.497894 systemd[1]: Started session-4.scope. Apr 12 18:32:20.498891 systemd-logind[1329]: New session 4 of user core. Apr 12 18:32:20.808627 sshd[1652]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:20.811397 systemd[1]: sshd@1-10.200.20.10:22-10.200.12.6:44246.service: Deactivated successfully. Apr 12 18:32:20.812124 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:32:20.812588 systemd-logind[1329]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:32:20.813518 systemd-logind[1329]: Removed session 4. Apr 12 18:32:20.878284 systemd[1]: Started sshd@2-10.200.20.10:22-10.200.12.6:44252.service. Apr 12 18:32:21.293474 sshd[1658]: Accepted publickey for core from 10.200.12.6 port 44252 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:21.295039 sshd[1658]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:21.298660 systemd-logind[1329]: New session 5 of user core. Apr 12 18:32:21.299095 systemd[1]: Started session-5.scope. Apr 12 18:32:21.608980 sshd[1658]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:21.611552 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:32:21.612253 systemd-logind[1329]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:32:21.612349 systemd[1]: sshd@2-10.200.20.10:22-10.200.12.6:44252.service: Deactivated successfully. Apr 12 18:32:21.613255 systemd-logind[1329]: Removed session 5. Apr 12 18:32:21.677728 systemd[1]: Started sshd@3-10.200.20.10:22-10.200.12.6:44266.service. Apr 12 18:32:22.088503 sshd[1664]: Accepted publickey for core from 10.200.12.6 port 44266 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:22.089708 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:22.093610 systemd-logind[1329]: New session 6 of user core. Apr 12 18:32:22.094047 systemd[1]: Started session-6.scope. Apr 12 18:32:22.404359 sshd[1664]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:22.406677 systemd[1]: sshd@3-10.200.20.10:22-10.200.12.6:44266.service: Deactivated successfully. Apr 12 18:32:22.407344 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:32:22.407895 systemd-logind[1329]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:32:22.408692 systemd-logind[1329]: Removed session 6. Apr 12 18:32:22.478715 systemd[1]: Started sshd@4-10.200.20.10:22-10.200.12.6:44282.service. Apr 12 18:32:22.920568 sshd[1670]: Accepted publickey for core from 10.200.12.6 port 44282 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:22.922099 sshd[1670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:22.926109 systemd[1]: Started session-7.scope. Apr 12 18:32:22.926517 systemd-logind[1329]: New session 7 of user core. Apr 12 18:32:23.447379 sudo[1673]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:32:23.447572 sudo[1673]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:32:23.532702 dbus-daemon[1313]: avc: received setenforce notice (enforcing=1) Apr 12 18:32:23.532876 sudo[1673]: pam_unix(sudo:session): session closed for user root Apr 12 18:32:23.645992 sshd[1670]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:23.648754 systemd[1]: sshd@4-10.200.20.10:22-10.200.12.6:44282.service: Deactivated successfully. Apr 12 18:32:23.649580 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:32:23.650163 systemd-logind[1329]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:32:23.651182 systemd-logind[1329]: Removed session 7. Apr 12 18:32:23.715176 systemd[1]: Started sshd@5-10.200.20.10:22-10.200.12.6:44292.service. Apr 12 18:32:24.126178 sshd[1677]: Accepted publickey for core from 10.200.12.6 port 44292 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:24.128406 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:24.132983 systemd[1]: Started session-8.scope. Apr 12 18:32:24.133816 systemd-logind[1329]: New session 8 of user core. Apr 12 18:32:24.364611 sudo[1681]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:32:24.364817 sudo[1681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:32:24.367324 sudo[1681]: pam_unix(sudo:session): session closed for user root Apr 12 18:32:24.371424 sudo[1680]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:32:24.371888 sudo[1680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:32:24.380238 systemd[1]: Stopping audit-rules.service... Apr 12 18:32:24.380000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:32:24.383991 auditctl[1684]: No rules Apr 12 18:32:24.393446 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:32:24.393620 systemd[1]: Stopped audit-rules.service. Apr 12 18:32:24.380000 audit[1684]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdba67a90 a2=420 a3=0 items=0 ppid=1 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:24.418297 kernel: audit: type=1305 audit(1712946744.380:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:32:24.418394 kernel: audit: type=1300 audit(1712946744.380:179): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdba67a90 a2=420 a3=0 items=0 ppid=1 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:24.395245 systemd[1]: Starting audit-rules.service... Apr 12 18:32:24.380000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:32:24.425971 kernel: audit: type=1327 audit(1712946744.380:179): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:32:24.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.443361 kernel: audit: type=1131 audit(1712946744.392:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.451208 augenrules[1701]: No rules Apr 12 18:32:24.452082 systemd[1]: Finished audit-rules.service. Apr 12 18:32:24.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.469000 audit[1680]: USER_END pid=1680 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.469764 sudo[1680]: pam_unix(sudo:session): session closed for user root Apr 12 18:32:24.489634 kernel: audit: type=1130 audit(1712946744.451:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.489718 kernel: audit: type=1106 audit(1712946744.469:182): pid=1680 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.489745 kernel: audit: type=1104 audit(1712946744.469:183): pid=1680 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.469000 audit[1680]: CRED_DISP pid=1680 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.547653 sshd[1677]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:24.548000 audit[1677]: USER_END pid=1677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:24.551017 systemd-logind[1329]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:32:24.548000 audit[1677]: CRED_DISP pid=1677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:24.552023 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:32:24.553000 systemd-logind[1329]: Removed session 8. Apr 12 18:32:24.553424 systemd[1]: sshd@5-10.200.20.10:22-10.200.12.6:44292.service: Deactivated successfully. Apr 12 18:32:24.591215 kernel: audit: type=1106 audit(1712946744.548:184): pid=1677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:24.591273 kernel: audit: type=1104 audit(1712946744.548:185): pid=1677 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:24.591296 kernel: audit: type=1131 audit(1712946744.552:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.10:22-10.200.12.6:44292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.10:22-10.200.12.6:44292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:24.617677 systemd[1]: Started sshd@6-10.200.20.10:22-10.200.12.6:44302.service. Apr 12 18:32:24.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.10:22-10.200.12.6:44302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:25.026000 audit[1707]: USER_ACCT pid=1707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:25.027850 sshd[1707]: Accepted publickey for core from 10.200.12.6 port 44302 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:32:25.028000 audit[1707]: CRED_ACQ pid=1707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:25.028000 audit[1707]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe07c5cd0 a2=3 a3=1 items=0 ppid=1 pid=1707 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:25.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:25.029406 sshd[1707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:25.033415 systemd[1]: Started session-9.scope. Apr 12 18:32:25.034046 systemd-logind[1329]: New session 9 of user core. Apr 12 18:32:25.037000 audit[1707]: USER_START pid=1707 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:25.038000 audit[1709]: CRED_ACQ pid=1709 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:32:25.264000 audit[1710]: USER_ACCT pid=1710 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:25.265696 sudo[1710]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:32:25.264000 audit[1710]: CRED_REFR pid=1710 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:25.265940 sudo[1710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:32:25.266000 audit[1710]: USER_START pid=1710 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:25.943504 systemd[1]: Starting docker.service... Apr 12 18:32:25.991345 env[1725]: time="2024-04-12T18:32:25.991298083Z" level=info msg="Starting up" Apr 12 18:32:25.992804 env[1725]: time="2024-04-12T18:32:25.992778765Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:32:25.992943 env[1725]: time="2024-04-12T18:32:25.992927845Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:32:25.993013 env[1725]: time="2024-04-12T18:32:25.992997805Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:32:25.993066 env[1725]: time="2024-04-12T18:32:25.993053885Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:32:25.994644 env[1725]: time="2024-04-12T18:32:25.994613807Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:32:25.994644 env[1725]: time="2024-04-12T18:32:25.994635567Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:32:25.994754 env[1725]: time="2024-04-12T18:32:25.994650327Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:32:25.994754 env[1725]: time="2024-04-12T18:32:25.994659327Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:32:26.002117 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport519525423-merged.mount: Deactivated successfully. Apr 12 18:32:26.103793 env[1725]: time="2024-04-12T18:32:26.103758699Z" level=info msg="Loading containers: start." Apr 12 18:32:26.186000 audit[1752]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.186000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffce741220 a2=0 a3=1 items=0 ppid=1725 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:32:26.188000 audit[1754]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.188000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcbdfbda0 a2=0 a3=1 items=0 ppid=1725 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:32:26.189000 audit[1756]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.189000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffec91e270 a2=0 a3=1 items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:32:26.191000 audit[1758]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.191000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff48580d0 a2=0 a3=1 items=0 ppid=1725 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:32:26.193000 audit[1760]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.193000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc4a14a70 a2=0 a3=1 items=0 ppid=1725 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:32:26.195000 audit[1762]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.195000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff0fb9290 a2=0 a3=1 items=0 ppid=1725 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:32:26.209000 audit[1764]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.209000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc80ec300 a2=0 a3=1 items=0 ppid=1725 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:32:26.211000 audit[1766]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.211000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe6654d60 a2=0 a3=1 items=0 ppid=1725 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:32:26.213000 audit[1768]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.213000 audit[1768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff2bf3750 a2=0 a3=1 items=0 ppid=1725 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:32:26.226000 audit[1772]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.226000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe5b742b0 a2=0 a3=1 items=0 ppid=1725 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:32:26.227000 audit[1773]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.227000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd198fe00 a2=0 a3=1 items=0 ppid=1725 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:32:26.260079 kernel: Initializing XFRM netlink socket Apr 12 18:32:26.312740 env[1725]: time="2024-04-12T18:32:26.312687399Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:32:26.397000 audit[1781]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.397000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff785c380 a2=0 a3=1 items=0 ppid=1725 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:32:26.421000 audit[1784]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.421000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff520c680 a2=0 a3=1 items=0 ppid=1725 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.421000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:32:26.424000 audit[1787]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.424000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe71b1050 a2=0 a3=1 items=0 ppid=1725 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:32:26.426000 audit[1789]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.426000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc76dcd50 a2=0 a3=1 items=0 ppid=1725 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:32:26.427000 audit[1791]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.427000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe3f1b860 a2=0 a3=1 items=0 ppid=1725 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.427000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:32:26.429000 audit[1793]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.429000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffc86d8560 a2=0 a3=1 items=0 ppid=1725 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:32:26.431000 audit[1795]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.431000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff07f7180 a2=0 a3=1 items=0 ppid=1725 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:32:26.433000 audit[1797]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.433000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffed8e6fb0 a2=0 a3=1 items=0 ppid=1725 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:32:26.434000 audit[1799]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.434000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe803de70 a2=0 a3=1 items=0 ppid=1725 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:32:26.436000 audit[1801]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.436000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc7ee8070 a2=0 a3=1 items=0 ppid=1725 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:32:26.438000 audit[1803]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.438000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff5b776d0 a2=0 a3=1 items=0 ppid=1725 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:32:26.439318 systemd-networkd[1488]: docker0: Link UP Apr 12 18:32:26.454000 audit[1807]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.454000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcb0d2d10 a2=0 a3=1 items=0 ppid=1725 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.454000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:32:26.457000 audit[1808]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:26.457000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe6a8fc60 a2=0 a3=1 items=0 ppid=1725 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:26.457000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:32:26.458457 env[1725]: time="2024-04-12T18:32:26.458423081Z" level=info msg="Loading containers: done." Apr 12 18:32:26.468944 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3181737268-merged.mount: Deactivated successfully. Apr 12 18:32:26.530106 env[1725]: time="2024-04-12T18:32:26.530067842Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:32:26.530486 env[1725]: time="2024-04-12T18:32:26.530466848Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:32:26.530668 env[1725]: time="2024-04-12T18:32:26.530653612Z" level=info msg="Daemon has completed initialization" Apr 12 18:32:26.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:26.560949 systemd[1]: Started docker.service. Apr 12 18:32:26.564208 env[1725]: time="2024-04-12T18:32:26.564168653Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:32:26.579786 systemd[1]: Reloading. Apr 12 18:32:26.638680 /usr/lib/systemd/system-generators/torcx-generator[1854]: time="2024-04-12T18:32:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:32:26.638711 /usr/lib/systemd/system-generators/torcx-generator[1854]: time="2024-04-12T18:32:26Z" level=info msg="torcx already run" Apr 12 18:32:26.717121 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:32:26.717139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:32:26.734542 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.795000 audit: BPF prog-id=38 op=LOAD Apr 12 18:32:26.795000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit: BPF prog-id=39 op=LOAD Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.796000 audit: BPF prog-id=40 op=LOAD Apr 12 18:32:26.796000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:32:26.796000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit: BPF prog-id=41 op=LOAD Apr 12 18:32:26.797000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.797000 audit: BPF prog-id=42 op=LOAD Apr 12 18:32:26.797000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:32:26.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit: BPF prog-id=43 op=LOAD Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.798000 audit: BPF prog-id=44 op=LOAD Apr 12 18:32:26.798000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:32:26.798000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.799000 audit: BPF prog-id=45 op=LOAD Apr 12 18:32:26.799000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.801000 audit: BPF prog-id=46 op=LOAD Apr 12 18:32:26.801000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit: BPF prog-id=47 op=LOAD Apr 12 18:32:26.802000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit: BPF prog-id=48 op=LOAD Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit: BPF prog-id=49 op=LOAD Apr 12 18:32:26.803000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:32:26.803000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit: BPF prog-id=50 op=LOAD Apr 12 18:32:26.803000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.803000 audit: BPF prog-id=51 op=LOAD Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:26.804000 audit: BPF prog-id=52 op=LOAD Apr 12 18:32:26.804000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:32:26.804000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:32:26.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:26.810929 systemd[1]: Started kubelet.service. Apr 12 18:32:26.855988 kubelet[1913]: E0412 18:32:26.855931 1913 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:32:26.858304 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:32:26.858426 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:32:26.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:32:29.674673 env[1341]: time="2024-04-12T18:32:29.674633839Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:32:30.485556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2162628699.mount: Deactivated successfully. Apr 12 18:32:32.795127 env[1341]: time="2024-04-12T18:32:32.795081707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:32.801343 env[1341]: time="2024-04-12T18:32:32.801300836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:32.805282 env[1341]: time="2024-04-12T18:32:32.805252892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:32.812768 env[1341]: time="2024-04-12T18:32:32.812736398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:32.813707 env[1341]: time="2024-04-12T18:32:32.813680451Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794\"" Apr 12 18:32:32.823427 env[1341]: time="2024-04-12T18:32:32.823388909Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:32:35.198545 env[1341]: time="2024-04-12T18:32:35.198493617Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:35.204011 env[1341]: time="2024-04-12T18:32:35.203960448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:35.212234 env[1341]: time="2024-04-12T18:32:35.212193795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:35.215663 env[1341]: time="2024-04-12T18:32:35.215634960Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:35.216405 env[1341]: time="2024-04-12T18:32:35.216374890Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195\"" Apr 12 18:32:35.225185 env[1341]: time="2024-04-12T18:32:35.225150324Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:32:36.577641 env[1341]: time="2024-04-12T18:32:36.577576499Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:36.583134 env[1341]: time="2024-04-12T18:32:36.583090409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:36.586891 env[1341]: time="2024-04-12T18:32:36.586859217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:36.591593 env[1341]: time="2024-04-12T18:32:36.591557916Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:36.592324 env[1341]: time="2024-04-12T18:32:36.592294566Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb\"" Apr 12 18:32:36.601560 env[1341]: time="2024-04-12T18:32:36.601530123Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:32:36.980599 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:32:36.980769 systemd[1]: Stopped kubelet.service. Apr 12 18:32:36.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:36.982222 systemd[1]: Started kubelet.service. Apr 12 18:32:36.986149 kernel: kauditd_printk_skb: 258 callbacks suppressed Apr 12 18:32:36.986215 kernel: audit: type=1130 audit(1712946756.979:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:36.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:37.018255 kernel: audit: type=1131 audit(1712946756.979:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:37.018365 kernel: audit: type=1130 audit(1712946756.981:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:36.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:37.067260 kubelet[1949]: E0412 18:32:37.067224 1949 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:32:37.069833 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:32:37.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:32:37.069969 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:32:37.087963 kernel: audit: type=1131 audit(1712946757.069:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:32:37.699606 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3858172334.mount: Deactivated successfully. Apr 12 18:32:38.392101 env[1341]: time="2024-04-12T18:32:38.392054710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:38.398408 env[1341]: time="2024-04-12T18:32:38.398360946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:38.402871 env[1341]: time="2024-04-12T18:32:38.402813879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:38.406874 env[1341]: time="2024-04-12T18:32:38.406801767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:38.407575 env[1341]: time="2024-04-12T18:32:38.407548856Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775\"" Apr 12 18:32:38.417765 env[1341]: time="2024-04-12T18:32:38.417728939Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:32:39.050146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2753907873.mount: Deactivated successfully. Apr 12 18:32:42.130381 env[1341]: time="2024-04-12T18:32:42.130332847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.135442 env[1341]: time="2024-04-12T18:32:42.135416182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.139599 env[1341]: time="2024-04-12T18:32:42.139567027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.143387 env[1341]: time="2024-04-12T18:32:42.143356708Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.144294 env[1341]: time="2024-04-12T18:32:42.144268118Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Apr 12 18:32:42.153071 env[1341]: time="2024-04-12T18:32:42.153036133Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:32:42.768877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount923420631.mount: Deactivated successfully. Apr 12 18:32:42.788100 env[1341]: time="2024-04-12T18:32:42.788056686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.794132 env[1341]: time="2024-04-12T18:32:42.794080191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.797938 env[1341]: time="2024-04-12T18:32:42.797903232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.801417 env[1341]: time="2024-04-12T18:32:42.801382150Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:42.801996 env[1341]: time="2024-04-12T18:32:42.801969476Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:32:42.810359 env[1341]: time="2024-04-12T18:32:42.810330247Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:32:43.529392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1363929218.mount: Deactivated successfully. Apr 12 18:32:46.822131 env[1341]: time="2024-04-12T18:32:46.822086396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:46.826060 env[1341]: time="2024-04-12T18:32:46.826031474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:46.830571 env[1341]: time="2024-04-12T18:32:46.830543478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:46.834355 env[1341]: time="2024-04-12T18:32:46.834329315Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:46.835151 env[1341]: time="2024-04-12T18:32:46.835121363Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Apr 12 18:32:47.230552 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:32:47.230726 systemd[1]: Stopped kubelet.service. Apr 12 18:32:47.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.232164 systemd[1]: Started kubelet.service. Apr 12 18:32:47.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.273349 kernel: audit: type=1130 audit(1712946767.229:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.273469 kernel: audit: type=1131 audit(1712946767.229:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.284324 kubelet[1993]: E0412 18:32:47.284291 1993 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:32:47.295959 kernel: audit: type=1130 audit(1712946767.231:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:47.297932 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:32:47.298043 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:32:47.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:32:47.319895 kernel: audit: type=1131 audit(1712946767.297:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:32:50.962304 systemd[1]: Stopped kubelet.service. Apr 12 18:32:50.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:50.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:50.999518 kernel: audit: type=1130 audit(1712946770.961:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:50.999617 kernel: audit: type=1131 audit(1712946770.961:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:51.008039 systemd[1]: Reloading. Apr 12 18:32:51.072702 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2024-04-12T18:32:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:32:51.072735 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2024-04-12T18:32:51Z" level=info msg="torcx already run" Apr 12 18:32:51.147854 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:32:51.148038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:32:51.165117 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.252649 kernel: audit: type=1400 audit(1712946771.226:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.252774 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:32:51.252799 kernel: audit: type=1400 audit(1712946771.226:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.269914 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.243000 audit: BPF prog-id=53 op=LOAD Apr 12 18:32:51.244000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.244000 audit: BPF prog-id=54 op=LOAD Apr 12 18:32:51.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit: BPF prog-id=55 op=LOAD Apr 12 18:32:51.245000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:32:51.245000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.245000 audit: BPF prog-id=56 op=LOAD Apr 12 18:32:51.245000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit: BPF prog-id=57 op=LOAD Apr 12 18:32:51.246000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit: BPF prog-id=58 op=LOAD Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.275000 audit: BPF prog-id=59 op=LOAD Apr 12 18:32:51.275000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:32:51.275000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.276000 audit: BPF prog-id=60 op=LOAD Apr 12 18:32:51.276000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.278000 audit: BPF prog-id=61 op=LOAD Apr 12 18:32:51.278000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit: BPF prog-id=62 op=LOAD Apr 12 18:32:51.279000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit: BPF prog-id=63 op=LOAD Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit: BPF prog-id=64 op=LOAD Apr 12 18:32:51.280000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:32:51.280000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit: BPF prog-id=65 op=LOAD Apr 12 18:32:51.280000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit: BPF prog-id=66 op=LOAD Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:51.280000 audit: BPF prog-id=67 op=LOAD Apr 12 18:32:51.280000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:32:51.280000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:32:51.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:51.293885 systemd[1]: Started kubelet.service. Apr 12 18:32:51.332254 kubelet[2121]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:32:51.332254 kubelet[2121]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:32:51.332254 kubelet[2121]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:32:51.332585 kubelet[2121]: I0412 18:32:51.332325 2121 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:32:52.136570 kubelet[2121]: I0412 18:32:52.136541 2121 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:32:52.136770 kubelet[2121]: I0412 18:32:52.136759 2121 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:32:52.137055 kubelet[2121]: I0412 18:32:52.137038 2121 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:32:52.140950 kubelet[2121]: E0412 18:32:52.140922 2121 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.10:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.141228 kubelet[2121]: I0412 18:32:52.141204 2121 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:32:52.146472 kubelet[2121]: I0412 18:32:52.146456 2121 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:32:52.146770 kubelet[2121]: I0412 18:32:52.146760 2121 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:32:52.147026 kubelet[2121]: I0412 18:32:52.147008 2121 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:32:52.147165 kubelet[2121]: I0412 18:32:52.147153 2121 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:32:52.147224 kubelet[2121]: I0412 18:32:52.147215 2121 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:32:52.147368 kubelet[2121]: I0412 18:32:52.147357 2121 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:32:52.147530 kubelet[2121]: I0412 18:32:52.147519 2121 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:32:52.147604 kubelet[2121]: I0412 18:32:52.147595 2121 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:32:52.147675 kubelet[2121]: I0412 18:32:52.147666 2121 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:32:52.147730 kubelet[2121]: I0412 18:32:52.147722 2121 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:32:52.147967 kubelet[2121]: W0412 18:32:52.147923 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.20.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-acc6b8d17d&limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.148019 kubelet[2121]: E0412 18:32:52.147973 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-acc6b8d17d&limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.148253 kubelet[2121]: I0412 18:32:52.148232 2121 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:32:52.148471 kubelet[2121]: I0412 18:32:52.148449 2121 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:32:52.148510 kubelet[2121]: W0412 18:32:52.148497 2121 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:32:52.148992 kubelet[2121]: I0412 18:32:52.148967 2121 server.go:1256] "Started kubelet" Apr 12 18:32:52.149993 kubelet[2121]: I0412 18:32:52.149964 2121 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:32:52.151314 kubelet[2121]: I0412 18:32:52.151287 2121 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:32:52.154307 kubelet[2121]: I0412 18:32:52.154268 2121 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:32:52.154514 kubelet[2121]: I0412 18:32:52.154493 2121 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:32:52.155000 audit[2121]: AVC avc: denied { mac_admin } for pid=2121 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:52.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:52.155000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cbed20 a1=4000d65368 a2=4000cbecf0 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.155000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:52.155000 audit[2121]: AVC avc: denied { mac_admin } for pid=2121 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:52.155000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:52.155000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d63800 a1=4000d65380 a2=4000cbedb0 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.155000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:52.156860 kubelet[2121]: I0412 18:32:52.156546 2121 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:32:52.156860 kubelet[2121]: I0412 18:32:52.156587 2121 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:32:52.156860 kubelet[2121]: I0412 18:32:52.156648 2121 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:32:52.157356 kubelet[2121]: E0412 18:32:52.157336 2121 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.10:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.10:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.3-a-acc6b8d17d.17c59c038117100d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.3-a-acc6b8d17d,UID:ci-3510.3.3-a-acc6b8d17d,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.3-a-acc6b8d17d,},FirstTimestamp:2024-04-12 18:32:52.148949005 +0000 UTC m=+0.849180469,LastTimestamp:2024-04-12 18:32:52.148949005 +0000 UTC m=+0.849180469,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.3-a-acc6b8d17d,}" Apr 12 18:32:52.158339 kubelet[2121]: W0412 18:32:52.158304 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.20.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.158458 kubelet[2121]: E0412 18:32:52.158447 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.159884 kubelet[2121]: E0412 18:32:52.159869 2121 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.3-a-acc6b8d17d\" not found" Apr 12 18:32:52.159997 kubelet[2121]: I0412 18:32:52.159986 2121 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:32:52.160137 kubelet[2121]: I0412 18:32:52.160126 2121 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:32:52.160237 kubelet[2121]: I0412 18:32:52.160227 2121 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:32:52.160567 kubelet[2121]: W0412 18:32:52.160539 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.20.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.160670 kubelet[2121]: E0412 18:32:52.160659 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.160913 kubelet[2121]: E0412 18:32:52.160898 2121 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:32:52.161232 kubelet[2121]: E0412 18:32:52.161218 2121 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-acc6b8d17d?timeout=10s\": dial tcp 10.200.20.10:6443: connect: connection refused" interval="200ms" Apr 12 18:32:52.161764 kubelet[2121]: I0412 18:32:52.161749 2121 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:32:52.161935 kubelet[2121]: I0412 18:32:52.161919 2121 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:32:52.161000 audit[2132]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.161000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc0cd810 a2=0 a3=1 items=0 ppid=2121 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:32:52.162975 kubelet[2121]: I0412 18:32:52.162959 2121 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:32:52.163000 audit[2133]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.163000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe43be700 a2=0 a3=1 items=0 ppid=2121 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:32:52.167000 audit[2135]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.167000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe9c161f0 a2=0 a3=1 items=0 ppid=2121 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:32:52.169000 audit[2137]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.169000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd3420120 a2=0 a3=1 items=0 ppid=2121 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:32:52.247000 audit[2142]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.253465 kernel: kauditd_printk_skb: 191 callbacks suppressed Apr 12 18:32:52.253531 kernel: audit: type=1325 audit(1712946772.247:583): table=filter:33 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.258491 kubelet[2121]: I0412 18:32:52.258465 2121 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:32:52.259565 kubelet[2121]: I0412 18:32:52.259549 2121 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:32:52.259678 kubelet[2121]: I0412 18:32:52.259666 2121 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:32:52.259743 kubelet[2121]: I0412 18:32:52.259734 2121 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:32:52.259857 kubelet[2121]: E0412 18:32:52.259847 2121 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:32:52.265190 kubelet[2121]: W0412 18:32:52.265156 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.20.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.265288 kubelet[2121]: E0412 18:32:52.265278 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.247000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe8c0fa60 a2=0 a3=1 items=0 ppid=2121 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.294045 kernel: audit: type=1300 audit(1712946772.247:583): arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe8c0fa60 a2=0 a3=1 items=0 ppid=2121 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:32:52.318322 kernel: audit: type=1327 audit(1712946772.247:583): proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:32:52.318743 kubelet[2121]: I0412 18:32:52.318700 2121 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.258000 audit[2144]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:52.333188 kernel: audit: type=1325 audit(1712946772.258:584): table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:52.333252 kubelet[2121]: E0412 18:32:52.319503 2121 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.10:6443/api/v1/nodes\": dial tcp 10.200.20.10:6443: connect: connection refused" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.333818 kubelet[2121]: I0412 18:32:52.333795 2121 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:32:52.333818 kubelet[2121]: I0412 18:32:52.333812 2121 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:32:52.333924 kubelet[2121]: I0412 18:32:52.333829 2121 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:32:52.258000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc6c42980 a2=0 a3=1 items=0 ppid=2121 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.360493 kernel: audit: type=1300 audit(1712946772.258:584): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc6c42980 a2=0 a3=1 items=0 ppid=2121 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.360659 kubelet[2121]: E0412 18:32:52.360639 2121 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:32:52.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:32:52.374922 kernel: audit: type=1327 audit(1712946772.258:584): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:32:52.374976 kubelet[2121]: I0412 18:32:52.364832 2121 policy_none.go:49] "None policy: Start" Apr 12 18:32:52.375633 kubelet[2121]: I0412 18:32:52.375618 2121 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:32:52.375723 kubelet[2121]: I0412 18:32:52.375713 2121 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:32:52.375898 kubelet[2121]: E0412 18:32:52.375872 2121 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-acc6b8d17d?timeout=10s\": dial tcp 10.200.20.10:6443: connect: connection refused" interval="400ms" Apr 12 18:32:52.258000 audit[2145]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.390166 kernel: audit: type=1325 audit(1712946772.258:585): table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.258000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd75b6e60 a2=0 a3=1 items=0 ppid=2121 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.416409 kernel: audit: type=1300 audit(1712946772.258:585): arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd75b6e60 a2=0 a3=1 items=0 ppid=2121 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:32:52.430213 kernel: audit: type=1327 audit(1712946772.258:585): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:32:52.258000 audit[2146]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.443825 kernel: audit: type=1325 audit(1712946772.258:586): table=nat:36 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.258000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff70ece80 a2=0 a3=1 items=0 ppid=2121 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:32:52.258000 audit[2147]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:52.258000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6b28620 a2=0 a3=1 items=0 ppid=2121 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:32:52.258000 audit[2148]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:52.258000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc600d70 a2=0 a3=1 items=0 ppid=2121 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:32:52.263000 audit[2149]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:52.263000 audit[2149]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd50b78e0 a2=0 a3=1 items=0 ppid=2121 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:32:52.263000 audit[2150]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:52.263000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6967b40 a2=0 a3=1 items=0 ppid=2121 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:32:52.447178 systemd[1]: Created slice kubepods.slice. Apr 12 18:32:52.451164 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:32:52.453825 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:32:52.462540 kubelet[2121]: I0412 18:32:52.462515 2121 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:32:52.462627 kubelet[2121]: I0412 18:32:52.462574 2121 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:32:52.462753 kubelet[2121]: I0412 18:32:52.462732 2121 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:32:52.461000 audit[2121]: AVC avc: denied { mac_admin } for pid=2121 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:52.461000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:52.461000 audit[2121]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c8ccc0 a1=4000f025e8 a2=4000c8cc90 a3=25 items=0 ppid=1 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:52.461000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:52.465677 kubelet[2121]: E0412 18:32:52.465657 2121 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.3-a-acc6b8d17d\" not found" Apr 12 18:32:52.521198 kubelet[2121]: I0412 18:32:52.521175 2121 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.521520 kubelet[2121]: E0412 18:32:52.521497 2121 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.10:6443/api/v1/nodes\": dial tcp 10.200.20.10:6443: connect: connection refused" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.561802 kubelet[2121]: I0412 18:32:52.561776 2121 topology_manager.go:215] "Topology Admit Handler" podUID="257b38bbb4db0bb14e2a5fcd78223ee2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.566218 kubelet[2121]: I0412 18:32:52.566188 2121 topology_manager.go:215] "Topology Admit Handler" podUID="b9a61961509233777f4073ac69b8829b" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.568133 kubelet[2121]: I0412 18:32:52.568106 2121 topology_manager.go:215] "Topology Admit Handler" podUID="e307467dc6c7f0ea681fe213aa099c90" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.573062 systemd[1]: Created slice kubepods-burstable-pod257b38bbb4db0bb14e2a5fcd78223ee2.slice. Apr 12 18:32:52.583631 systemd[1]: Created slice kubepods-burstable-podb9a61961509233777f4073ac69b8829b.slice. Apr 12 18:32:52.593887 systemd[1]: Created slice kubepods-burstable-pode307467dc6c7f0ea681fe213aa099c90.slice. Apr 12 18:32:52.676781 kubelet[2121]: I0412 18:32:52.676675 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.676781 kubelet[2121]: I0412 18:32:52.676721 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.676781 kubelet[2121]: I0412 18:32:52.676744 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e307467dc6c7f0ea681fe213aa099c90-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-acc6b8d17d\" (UID: \"e307467dc6c7f0ea681fe213aa099c90\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.676781 kubelet[2121]: I0412 18:32:52.676764 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.678010 kubelet[2121]: I0412 18:32:52.677980 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.678182 kubelet[2121]: I0412 18:32:52.678153 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.678317 kubelet[2121]: I0412 18:32:52.678304 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.678437 kubelet[2121]: I0412 18:32:52.678425 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.678552 kubelet[2121]: I0412 18:32:52.678541 2121 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.777282 kubelet[2121]: E0412 18:32:52.777238 2121 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-acc6b8d17d?timeout=10s\": dial tcp 10.200.20.10:6443: connect: connection refused" interval="800ms" Apr 12 18:32:52.883510 env[1341]: time="2024-04-12T18:32:52.883177242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-acc6b8d17d,Uid:257b38bbb4db0bb14e2a5fcd78223ee2,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:52.893452 env[1341]: time="2024-04-12T18:32:52.893413728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-acc6b8d17d,Uid:b9a61961509233777f4073ac69b8829b,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:52.896393 env[1341]: time="2024-04-12T18:32:52.896271072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-acc6b8d17d,Uid:e307467dc6c7f0ea681fe213aa099c90,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:52.923510 kubelet[2121]: I0412 18:32:52.923490 2121 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.924014 kubelet[2121]: E0412 18:32:52.924000 2121 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.10:6443/api/v1/nodes\": dial tcp 10.200.20.10:6443: connect: connection refused" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:52.990790 kubelet[2121]: W0412 18:32:52.990739 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.20.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-acc6b8d17d&limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:52.992405 kubelet[2121]: E0412 18:32:52.990890 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.10:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.3-a-acc6b8d17d&limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.292265 kubelet[2121]: W0412 18:32:53.292145 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.20.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.292265 kubelet[2121]: E0412 18:32:53.292184 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.10:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.441999 kubelet[2121]: W0412 18:32:53.441942 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.20.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.441999 kubelet[2121]: E0412 18:32:53.441980 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.10:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.565511 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2948516651.mount: Deactivated successfully. Apr 12 18:32:53.578059 kubelet[2121]: E0412 18:32:53.578028 2121 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-acc6b8d17d?timeout=10s\": dial tcp 10.200.20.10:6443: connect: connection refused" interval="1.6s" Apr 12 18:32:53.591775 env[1341]: time="2024-04-12T18:32:53.591728903Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.595695 env[1341]: time="2024-04-12T18:32:53.595655655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.603907 env[1341]: time="2024-04-12T18:32:53.603866363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.606660 env[1341]: time="2024-04-12T18:32:53.606631625Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.611727 env[1341]: time="2024-04-12T18:32:53.611691947Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.613314 env[1341]: time="2024-04-12T18:32:53.613289480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.615797 env[1341]: time="2024-04-12T18:32:53.615769380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.617816 env[1341]: time="2024-04-12T18:32:53.617778276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.620953 env[1341]: time="2024-04-12T18:32:53.620925902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.625708 env[1341]: time="2024-04-12T18:32:53.625681421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.635076 env[1341]: time="2024-04-12T18:32:53.635040458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.653553 env[1341]: time="2024-04-12T18:32:53.653510529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:53.672011 env[1341]: time="2024-04-12T18:32:53.670157185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:53.672011 env[1341]: time="2024-04-12T18:32:53.670204705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:53.672011 env[1341]: time="2024-04-12T18:32:53.670214585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:53.672011 env[1341]: time="2024-04-12T18:32:53.670377427Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8cba73cf0b1d3db5b8bc33220e330f3d5c84737f6b483571af4724762e85a620 pid=2158 runtime=io.containerd.runc.v2 Apr 12 18:32:53.700798 systemd[1]: Started cri-containerd-8cba73cf0b1d3db5b8bc33220e330f3d5c84737f6b483571af4724762e85a620.scope. Apr 12 18:32:53.705261 env[1341]: time="2024-04-12T18:32:53.702095806Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:53.705261 env[1341]: time="2024-04-12T18:32:53.702135287Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:53.705261 env[1341]: time="2024-04-12T18:32:53.702145727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:53.705261 env[1341]: time="2024-04-12T18:32:53.702281408Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537 pid=2189 runtime=io.containerd.runc.v2 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.713000 audit: BPF prog-id=68 op=LOAD Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2158 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626137336366306231643364623562386263333332323065333330 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2158 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626137336366306231643364623562386263333332323065333330 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.714000 audit: BPF prog-id=69 op=LOAD Apr 12 18:32:53.714000 audit[2169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2158 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626137336366306231643364623562386263333332323065333330 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.715000 audit: BPF prog-id=70 op=LOAD Apr 12 18:32:53.715000 audit[2169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2158 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626137336366306231643364623562386263333332323065333330 Apr 12 18:32:53.716000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:32:53.716000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { perfmon } for pid=2169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit[2169]: AVC avc: denied { bpf } for pid=2169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.716000 audit: BPF prog-id=71 op=LOAD Apr 12 18:32:53.716000 audit[2169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2158 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626137336366306231643364623562386263333332323065333330 Apr 12 18:32:53.722915 systemd[1]: Started cri-containerd-37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537.scope. Apr 12 18:32:53.728347 kubelet[2121]: I0412 18:32:53.728309 2121 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:53.728637 kubelet[2121]: E0412 18:32:53.728620 2121 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.10:6443/api/v1/nodes\": dial tcp 10.200.20.10:6443: connect: connection refused" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:53.730136 env[1341]: time="2024-04-12T18:32:53.730072995Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:53.730286 env[1341]: time="2024-04-12T18:32:53.730262677Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:53.735541 env[1341]: time="2024-04-12T18:32:53.735485599Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:53.736026 env[1341]: time="2024-04-12T18:32:53.735982844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5 pid=2218 runtime=io.containerd.runc.v2 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.739000 audit: BPF prog-id=72 op=LOAD Apr 12 18:32:53.739000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.739000 audit[2202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2189 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337643262383266646333666333663731343437616562613762316438 Apr 12 18:32:53.739000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.739000 audit[2202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2189 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337643262383266646333666333663731343437616562613762316438 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit: BPF prog-id=73 op=LOAD Apr 12 18:32:53.740000 audit[2202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2189 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337643262383266646333666333663731343437616562613762316438 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.740000 audit: BPF prog-id=74 op=LOAD Apr 12 18:32:53.740000 audit[2202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2189 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337643262383266646333666333663731343437616562613762316438 Apr 12 18:32:53.741000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:32:53.741000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.741000 audit: BPF prog-id=75 op=LOAD Apr 12 18:32:53.741000 audit[2202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2189 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337643262383266646333666333663731343437616562613762316438 Apr 12 18:32:53.753123 env[1341]: time="2024-04-12T18:32:53.753079143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.3-a-acc6b8d17d,Uid:257b38bbb4db0bb14e2a5fcd78223ee2,Namespace:kube-system,Attempt:0,} returns sandbox id \"8cba73cf0b1d3db5b8bc33220e330f3d5c84737f6b483571af4724762e85a620\"" Apr 12 18:32:53.757024 env[1341]: time="2024-04-12T18:32:53.756992055Z" level=info msg="CreateContainer within sandbox \"8cba73cf0b1d3db5b8bc33220e330f3d5c84737f6b483571af4724762e85a620\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:32:53.760421 kubelet[2121]: W0412 18:32:53.760377 2121 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.20.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.760421 kubelet[2121]: E0412 18:32:53.760420 2121 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.10:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.10:6443: connect: connection refused Apr 12 18:32:53.767758 env[1341]: time="2024-04-12T18:32:53.767712383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.3-a-acc6b8d17d,Uid:e307467dc6c7f0ea681fe213aa099c90,Namespace:kube-system,Attempt:0,} returns sandbox id \"37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537\"" Apr 12 18:32:53.769951 systemd[1]: Started cri-containerd-fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5.scope. Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.781000 audit: BPF prog-id=76 op=LOAD Apr 12 18:32:53.782000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.783750 env[1341]: time="2024-04-12T18:32:53.783722514Z" level=info msg="CreateContainer within sandbox \"37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:32:53.782000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2218 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343864306339653639313166343933643163653837383366623263 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2218 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343864306339653639313166343933643163653837383366623263 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit: BPF prog-id=77 op=LOAD Apr 12 18:32:53.784000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2218 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343864306339653639313166343933643163653837383366623263 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.784000 audit: BPF prog-id=78 op=LOAD Apr 12 18:32:53.784000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2218 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343864306339653639313166343933643163653837383366623263 Apr 12 18:32:53.785000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:32:53.785000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.785000 audit: BPF prog-id=79 op=LOAD Apr 12 18:32:53.785000 audit[2240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2218 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663343864306339653639313166343933643163653837383366623263 Apr 12 18:32:53.805430 env[1341]: time="2024-04-12T18:32:53.805399091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.3-a-acc6b8d17d,Uid:b9a61961509233777f4073ac69b8829b,Namespace:kube-system,Attempt:0,} returns sandbox id \"fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5\"" Apr 12 18:32:53.809885 env[1341]: time="2024-04-12T18:32:53.809832568Z" level=info msg="CreateContainer within sandbox \"fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:32:53.822296 env[1341]: time="2024-04-12T18:32:53.822216269Z" level=info msg="CreateContainer within sandbox \"8cba73cf0b1d3db5b8bc33220e330f3d5c84737f6b483571af4724762e85a620\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"48f1d778f3a50e02cdd26cacc71d43c85c3c576a2392bfea0b1da225acd78057\"" Apr 12 18:32:53.824284 env[1341]: time="2024-04-12T18:32:53.824261606Z" level=info msg="StartContainer for \"48f1d778f3a50e02cdd26cacc71d43c85c3c576a2392bfea0b1da225acd78057\"" Apr 12 18:32:53.838594 systemd[1]: Started cri-containerd-48f1d778f3a50e02cdd26cacc71d43c85c3c576a2392bfea0b1da225acd78057.scope. Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.855000 audit: BPF prog-id=80 op=LOAD Apr 12 18:32:53.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.856000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2158 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663164373738663361353065303263646432366361636337316434 Apr 12 18:32:53.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.856000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2158 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663164373738663361353065303263646432366361636337316434 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit: BPF prog-id=81 op=LOAD Apr 12 18:32:53.857000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2158 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663164373738663361353065303263646432366361636337316434 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.857000 audit: BPF prog-id=82 op=LOAD Apr 12 18:32:53.857000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2158 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663164373738663361353065303263646432366361636337316434 Apr 12 18:32:53.858000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:32:53.858000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.858000 audit: BPF prog-id=83 op=LOAD Apr 12 18:32:53.858000 audit[2290]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2158 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438663164373738663361353065303263646432366361636337316434 Apr 12 18:32:53.860781 env[1341]: time="2024-04-12T18:32:53.860699304Z" level=info msg="CreateContainer within sandbox \"37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5\"" Apr 12 18:32:53.861210 env[1341]: time="2024-04-12T18:32:53.861177388Z" level=info msg="StartContainer for \"007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5\"" Apr 12 18:32:53.878560 env[1341]: time="2024-04-12T18:32:53.878530050Z" level=info msg="CreateContainer within sandbox \"fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3\"" Apr 12 18:32:53.880372 systemd[1]: Started cri-containerd-007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5.scope. Apr 12 18:32:53.886231 env[1341]: time="2024-04-12T18:32:53.886206113Z" level=info msg="StartContainer for \"f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3\"" Apr 12 18:32:53.897440 env[1341]: time="2024-04-12T18:32:53.897405444Z" level=info msg="StartContainer for \"48f1d778f3a50e02cdd26cacc71d43c85c3c576a2392bfea0b1da225acd78057\" returns successfully" Apr 12 18:32:53.905352 systemd[1]: Started cri-containerd-f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3.scope. Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.908000 audit: BPF prog-id=84 op=LOAD Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2189 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030376539646364366532393234323164353636336231346461303662 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2189 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030376539646364366532393234323164353636336231346461303662 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit: BPF prog-id=85 op=LOAD Apr 12 18:32:53.909000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2189 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030376539646364366532393234323164353636336231346461303662 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit: BPF prog-id=86 op=LOAD Apr 12 18:32:53.909000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2189 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030376539646364366532393234323164353636336231346461303662 Apr 12 18:32:53.909000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:32:53.909000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { perfmon } for pid=2315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit[2315]: AVC avc: denied { bpf } for pid=2315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.909000 audit: BPF prog-id=87 op=LOAD Apr 12 18:32:53.909000 audit[2315]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2189 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030376539646364366532393234323164353636336231346461303662 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.931000 audit: BPF prog-id=88 op=LOAD Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2218 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633616537656439363731616234373435386261316131623163613266 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2218 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633616537656439363731616234373435386261316131623163613266 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit: BPF prog-id=89 op=LOAD Apr 12 18:32:53.932000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2218 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633616537656439363731616234373435386261316131623163613266 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit: BPF prog-id=90 op=LOAD Apr 12 18:32:53.932000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2218 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633616537656439363731616234373435386261316131623163613266 Apr 12 18:32:53.932000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:32:53.932000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:53.932000 audit: BPF prog-id=91 op=LOAD Apr 12 18:32:53.932000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2218 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:53.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633616537656439363731616234373435386261316131623163613266 Apr 12 18:32:53.950885 env[1341]: time="2024-04-12T18:32:53.950708400Z" level=info msg="StartContainer for \"007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5\" returns successfully" Apr 12 18:32:53.965026 env[1341]: time="2024-04-12T18:32:53.964982157Z" level=info msg="StartContainer for \"f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3\" returns successfully" Apr 12 18:32:55.329984 kubelet[2121]: I0412 18:32:55.329954 2121 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:55.766000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.766000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40075c4cc0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:55.768000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.768000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=400320c8c0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:55.768000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.768000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40075c4de0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:55.779000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.779000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=48 a1=4004c91dd0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:55.781000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.781000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4006511480 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:55.782000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:55.782000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=40060e8270 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:32:55.782000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:32:56.021355 kubelet[2121]: I0412 18:32:56.021252 2121 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:56.158455 kubelet[2121]: I0412 18:32:56.158405 2121 apiserver.go:52] "Watching apiserver" Apr 12 18:32:56.176449 kubelet[2121]: E0412 18:32:56.176410 2121 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Apr 12 18:32:56.261301 kubelet[2121]: I0412 18:32:56.261268 2121 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:32:56.338000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:56.338000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006ce000 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:32:56.338000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:56.339000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:56.339000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000fc400 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:32:56.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:57.556704 kubelet[2121]: W0412 18:32:57.556678 2121 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:32:58.892148 systemd[1]: Reloading. Apr 12 18:32:58.984277 /usr/lib/systemd/system-generators/torcx-generator[2417]: time="2024-04-12T18:32:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:32:58.984679 /usr/lib/systemd/system-generators/torcx-generator[2417]: time="2024-04-12T18:32:58Z" level=info msg="torcx already run" Apr 12 18:32:59.057235 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:32:59.057252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:32:59.074409 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:32:59.179060 kernel: kauditd_printk_skb: 384 callbacks suppressed Apr 12 18:32:59.179160 kernel: audit: type=1400 audit(1712946779.155:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.196519 kernel: audit: type=1400 audit(1712946779.161:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213751 kernel: audit: type=1400 audit(1712946779.161:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.231521 kernel: audit: type=1400 audit(1712946779.161:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.248940 kernel: audit: type=1400 audit(1712946779.161:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.275592 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:32:59.275690 kernel: audit: type=1400 audit(1712946779.161:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.275720 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.299064 kernel: audit: type=1400 audit(1712946779.161:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.299159 kernel: audit: backlog limit exceeded Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit: BPF prog-id=92 op=LOAD Apr 12 18:32:59.178000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit: BPF prog-id=93 op=LOAD Apr 12 18:32:59.195000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit: BPF prog-id=94 op=LOAD Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit: BPF prog-id=95 op=LOAD Apr 12 18:32:59.213000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:32:59.213000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit: BPF prog-id=96 op=LOAD Apr 12 18:32:59.230000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.248000 audit: BPF prog-id=97 op=LOAD Apr 12 18:32:59.248000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:32:59.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit: BPF prog-id=98 op=LOAD Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.302000 audit: BPF prog-id=99 op=LOAD Apr 12 18:32:59.302000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:32:59.302000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.303000 audit: BPF prog-id=100 op=LOAD Apr 12 18:32:59.303000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.304000 audit: BPF prog-id=101 op=LOAD Apr 12 18:32:59.304000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit: BPF prog-id=102 op=LOAD Apr 12 18:32:59.305000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.305000 audit: BPF prog-id=103 op=LOAD Apr 12 18:32:59.305000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.306000 audit: BPF prog-id=104 op=LOAD Apr 12 18:32:59.306000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit: BPF prog-id=105 op=LOAD Apr 12 18:32:59.309000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.309000 audit: BPF prog-id=106 op=LOAD Apr 12 18:32:59.309000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit: BPF prog-id=107 op=LOAD Apr 12 18:32:59.310000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit: BPF prog-id=108 op=LOAD Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.310000 audit: BPF prog-id=109 op=LOAD Apr 12 18:32:59.310000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:32:59.310000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:32:59.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit: BPF prog-id=110 op=LOAD Apr 12 18:32:59.312000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit: BPF prog-id=111 op=LOAD Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.312000 audit: BPF prog-id=112 op=LOAD Apr 12 18:32:59.312000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:32:59.312000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:32:59.325264 kubelet[2121]: I0412 18:32:59.324897 2121 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:32:59.325042 systemd[1]: Stopping kubelet.service... Apr 12 18:32:59.341166 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:32:59.341457 systemd[1]: Stopped kubelet.service. Apr 12 18:32:59.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:59.341755 systemd[1]: kubelet.service: Consumed 1.091s CPU time. Apr 12 18:32:59.343737 systemd[1]: Started kubelet.service. Apr 12 18:32:59.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:59.397186 kubelet[2476]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:32:59.397585 kubelet[2476]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:32:59.397644 kubelet[2476]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:32:59.397763 kubelet[2476]: I0412 18:32:59.397735 2476 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:32:59.404983 kubelet[2476]: I0412 18:32:59.404955 2476 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:32:59.404983 kubelet[2476]: I0412 18:32:59.404978 2476 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:32:59.405147 kubelet[2476]: I0412 18:32:59.405128 2476 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:32:59.406534 kubelet[2476]: I0412 18:32:59.406512 2476 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:32:59.408664 kubelet[2476]: I0412 18:32:59.408645 2476 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:32:59.416232 kubelet[2476]: I0412 18:32:59.416205 2476 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:32:59.416401 kubelet[2476]: I0412 18:32:59.416384 2476 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:32:59.416547 kubelet[2476]: I0412 18:32:59.416527 2476 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:32:59.416623 kubelet[2476]: I0412 18:32:59.416550 2476 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:32:59.416623 kubelet[2476]: I0412 18:32:59.416559 2476 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:32:59.416623 kubelet[2476]: I0412 18:32:59.416586 2476 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:32:59.416713 kubelet[2476]: I0412 18:32:59.416668 2476 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:32:59.416713 kubelet[2476]: I0412 18:32:59.416680 2476 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:32:59.416713 kubelet[2476]: I0412 18:32:59.416699 2476 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:32:59.416713 kubelet[2476]: I0412 18:32:59.416711 2476 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:32:59.419000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.419000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:59.419000 audit[2476]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004bdd10 a1=40004fcab0 a2=40004bdce0 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:59.419000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:59.420000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.420000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:59.420000 audit[2476]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000577ae0 a1=40004fcaf8 a2=40004bdda0 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:59.420000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.418505 2476 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.418695 2476 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.419122 2476 server.go:1256] "Started kubelet" Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.420892 2476 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.420950 2476 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:32:59.423032 kubelet[2476]: I0412 18:32:59.420980 2476 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.433624 2476 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.434260 2476 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.435112 2476 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.435248 2476 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.436440 2476 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.437482 2476 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.437606 2476 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.438744 2476 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.439496 2476 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.439516 2476 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:32:59.439621 kubelet[2476]: I0412 18:32:59.439531 2476 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:32:59.439621 kubelet[2476]: E0412 18:32:59.439569 2476 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:32:59.442965 kubelet[2476]: I0412 18:32:59.442945 2476 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:32:59.443152 kubelet[2476]: I0412 18:32:59.443135 2476 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:32:59.457006 kubelet[2476]: I0412 18:32:59.456979 2476 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:32:59.470485 kubelet[2476]: E0412 18:32:59.463574 2476 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:32:59.514086 kubelet[2476]: I0412 18:32:59.514063 2476 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:32:59.514256 kubelet[2476]: I0412 18:32:59.514245 2476 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:32:59.514320 kubelet[2476]: I0412 18:32:59.514312 2476 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:32:59.514504 kubelet[2476]: I0412 18:32:59.514492 2476 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:32:59.514587 kubelet[2476]: I0412 18:32:59.514577 2476 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:32:59.514637 kubelet[2476]: I0412 18:32:59.514629 2476 policy_none.go:49] "None policy: Start" Apr 12 18:32:59.515329 kubelet[2476]: I0412 18:32:59.515313 2476 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:32:59.515421 kubelet[2476]: I0412 18:32:59.515412 2476 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:32:59.515631 kubelet[2476]: I0412 18:32:59.515619 2476 state_mem.go:75] "Updated machine memory state" Apr 12 18:32:59.521004 kubelet[2476]: I0412 18:32:59.520988 2476 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:32:59.520000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:59.520000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:32:59.520000 audit[2476]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000907260 a1=4000c97548 a2=4000907230 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:59.520000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:32:59.521340 kubelet[2476]: I0412 18:32:59.521325 2476 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:32:59.521582 kubelet[2476]: I0412 18:32:59.521569 2476 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:32:59.541015 kubelet[2476]: I0412 18:32:59.540984 2476 topology_manager.go:215] "Topology Admit Handler" podUID="257b38bbb4db0bb14e2a5fcd78223ee2" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.541103 kubelet[2476]: I0412 18:32:59.541069 2476 topology_manager.go:215] "Topology Admit Handler" podUID="b9a61961509233777f4073ac69b8829b" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.541229 kubelet[2476]: I0412 18:32:59.541143 2476 topology_manager.go:215] "Topology Admit Handler" podUID="e307467dc6c7f0ea681fe213aa099c90" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.547289 kubelet[2476]: W0412 18:32:59.547273 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:32:59.548208 kubelet[2476]: I0412 18:32:59.548191 2476 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.554343 kubelet[2476]: W0412 18:32:59.554250 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:32:59.558121 kubelet[2476]: W0412 18:32:59.557921 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Apr 12 18:32:59.558121 kubelet[2476]: I0412 18:32:59.558055 2476 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.558121 kubelet[2476]: I0412 18:32:59.558119 2476 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.558985 kubelet[2476]: E0412 18:32:59.558279 2476 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.3-a-acc6b8d17d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639116 kubelet[2476]: I0412 18:32:59.639089 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639304 kubelet[2476]: I0412 18:32:59.639292 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639401 kubelet[2476]: I0412 18:32:59.639391 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639487 kubelet[2476]: I0412 18:32:59.639478 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e307467dc6c7f0ea681fe213aa099c90-kubeconfig\") pod \"kube-scheduler-ci-3510.3.3-a-acc6b8d17d\" (UID: \"e307467dc6c7f0ea681fe213aa099c90\") " pod="kube-system/kube-scheduler-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639586 kubelet[2476]: I0412 18:32:59.639576 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639679 kubelet[2476]: I0412 18:32:59.639669 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/257b38bbb4db0bb14e2a5fcd78223ee2-ca-certs\") pod \"kube-apiserver-ci-3510.3.3-a-acc6b8d17d\" (UID: \"257b38bbb4db0bb14e2a5fcd78223ee2\") " pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639769 kubelet[2476]: I0412 18:32:59.639759 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639876 kubelet[2476]: I0412 18:32:59.639866 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:32:59.639962 kubelet[2476]: I0412 18:32:59.639953 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b9a61961509233777f4073ac69b8829b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.3-a-acc6b8d17d\" (UID: \"b9a61961509233777f4073ac69b8829b\") " pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:00.418194 kubelet[2476]: I0412 18:33:00.418143 2476 apiserver.go:52] "Watching apiserver" Apr 12 18:33:00.437861 kubelet[2476]: I0412 18:33:00.437805 2476 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:33:00.572687 kubelet[2476]: I0412 18:33:00.572658 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" podStartSLOduration=1.57259708 podStartE2EDuration="1.57259708s" podCreationTimestamp="2024-04-12 18:32:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:00.522541414 +0000 UTC m=+1.169191480" watchObservedRunningTime="2024-04-12 18:33:00.57259708 +0000 UTC m=+1.219247146" Apr 12 18:33:00.646176 kubelet[2476]: I0412 18:33:00.646142 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.3-a-acc6b8d17d" podStartSLOduration=1.6461025089999999 podStartE2EDuration="1.646102509s" podCreationTimestamp="2024-04-12 18:32:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:00.573112404 +0000 UTC m=+1.219762470" watchObservedRunningTime="2024-04-12 18:33:00.646102509 +0000 UTC m=+1.292752535" Apr 12 18:33:00.677852 kubelet[2476]: I0412 18:33:00.677736 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.3-a-acc6b8d17d" podStartSLOduration=3.677694328 podStartE2EDuration="3.677694328s" podCreationTimestamp="2024-04-12 18:32:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:00.647025156 +0000 UTC m=+1.293675222" watchObservedRunningTime="2024-04-12 18:33:00.677694328 +0000 UTC m=+1.324344394" Apr 12 18:33:02.220000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=523069 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:33:02.220000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400121c000 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:02.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:03.505579 sudo[1710]: pam_unix(sudo:session): session closed for user root Apr 12 18:33:03.504000 audit[1710]: USER_END pid=1710 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:03.504000 audit[1710]: CRED_DISP pid=1710 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:33:03.578695 sshd[1707]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:03.578000 audit[1707]: USER_END pid=1707 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:03.578000 audit[1707]: CRED_DISP pid=1707 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:33:03.581476 systemd-logind[1329]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:33:03.582509 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:33:03.582686 systemd[1]: session-9.scope: Consumed 5.224s CPU time. Apr 12 18:33:03.583540 systemd-logind[1329]: Removed session 9. Apr 12 18:33:03.584006 systemd[1]: sshd@6-10.200.20.10:22-10.200.12.6:44302.service: Deactivated successfully. Apr 12 18:33:03.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.10:22-10.200.12.6:44302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:13.360865 kernel: kauditd_printk_skb: 258 callbacks suppressed Apr 12 18:33:13.361030 kernel: audit: type=1400 audit(1712946793.354:962): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.354000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.356000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.404824 kernel: audit: type=1400 audit(1712946793.356:963): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.356000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9c40 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.434903 kernel: audit: type=1300 audit(1712946793.356:963): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9c40 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.459452 kernel: audit: type=1327 audit(1712946793.356:963): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.356000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.481834 kernel: audit: type=1400 audit(1712946793.356:964): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.356000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9c80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.511239 kernel: audit: type=1300 audit(1712946793.356:964): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9c80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.536025 kernel: audit: type=1327 audit(1712946793.356:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.356000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.557990 kernel: audit: type=1400 audit(1712946793.356:965): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:13.356000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9cc0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.587680 kernel: audit: type=1300 audit(1712946793.356:965): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fb9cc0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.612445 kernel: audit: type=1327 audit(1712946793.356:965): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.354000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f13b20 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:13.354000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:13.768007 kubelet[2476]: I0412 18:33:13.767977 2476 topology_manager.go:215] "Topology Admit Handler" podUID="133c7c81-b1ed-4bcb-bc4a-d79780da9b6c" podNamespace="kube-system" podName="kube-proxy-xh2rf" Apr 12 18:33:13.773184 systemd[1]: Created slice kubepods-besteffort-pod133c7c81_b1ed_4bcb_bc4a_d79780da9b6c.slice. Apr 12 18:33:13.777826 kubelet[2476]: W0412 18:33:13.777796 2476 reflector.go:539] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.3-a-acc6b8d17d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-acc6b8d17d' and this object Apr 12 18:33:13.777996 kubelet[2476]: E0412 18:33:13.777981 2476 reflector.go:147] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.3-a-acc6b8d17d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-acc6b8d17d' and this object Apr 12 18:33:13.778079 kubelet[2476]: W0412 18:33:13.777812 2476 reflector.go:539] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.3-a-acc6b8d17d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-acc6b8d17d' and this object Apr 12 18:33:13.778170 kubelet[2476]: E0412 18:33:13.778159 2476 reflector.go:147] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.3-a-acc6b8d17d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.3-a-acc6b8d17d' and this object Apr 12 18:33:13.821323 kubelet[2476]: I0412 18:33:13.821296 2476 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:33:13.821994 env[1341]: time="2024-04-12T18:33:13.821889445Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:33:13.822271 kubelet[2476]: I0412 18:33:13.822091 2476 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:33:13.837559 kubelet[2476]: I0412 18:33:13.837523 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-xtables-lock\") pod \"kube-proxy-xh2rf\" (UID: \"133c7c81-b1ed-4bcb-bc4a-d79780da9b6c\") " pod="kube-system/kube-proxy-xh2rf" Apr 12 18:33:13.837696 kubelet[2476]: I0412 18:33:13.837605 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwhkd\" (UniqueName: \"kubernetes.io/projected/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-kube-api-access-lwhkd\") pod \"kube-proxy-xh2rf\" (UID: \"133c7c81-b1ed-4bcb-bc4a-d79780da9b6c\") " pod="kube-system/kube-proxy-xh2rf" Apr 12 18:33:13.837696 kubelet[2476]: I0412 18:33:13.837629 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-lib-modules\") pod \"kube-proxy-xh2rf\" (UID: \"133c7c81-b1ed-4bcb-bc4a-d79780da9b6c\") " pod="kube-system/kube-proxy-xh2rf" Apr 12 18:33:13.837696 kubelet[2476]: I0412 18:33:13.837677 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-kube-proxy\") pod \"kube-proxy-xh2rf\" (UID: \"133c7c81-b1ed-4bcb-bc4a-d79780da9b6c\") " pod="kube-system/kube-proxy-xh2rf" Apr 12 18:33:14.309379 kubelet[2476]: I0412 18:33:14.309345 2476 topology_manager.go:215] "Topology Admit Handler" podUID="3680ff2d-72b0-4d93-bf41-c55d3478688e" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-xz9nj" Apr 12 18:33:14.314425 systemd[1]: Created slice kubepods-besteffort-pod3680ff2d_72b0_4d93_bf41_c55d3478688e.slice. Apr 12 18:33:14.340187 kubelet[2476]: I0412 18:33:14.340156 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3680ff2d-72b0-4d93-bf41-c55d3478688e-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-xz9nj\" (UID: \"3680ff2d-72b0-4d93-bf41-c55d3478688e\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-xz9nj" Apr 12 18:33:14.340296 kubelet[2476]: I0412 18:33:14.340198 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ldcrk\" (UniqueName: \"kubernetes.io/projected/3680ff2d-72b0-4d93-bf41-c55d3478688e-kube-api-access-ldcrk\") pod \"tigera-operator-6bfc79cb9c-xz9nj\" (UID: \"3680ff2d-72b0-4d93-bf41-c55d3478688e\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-xz9nj" Apr 12 18:33:14.618754 env[1341]: time="2024-04-12T18:33:14.618372651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-xz9nj,Uid:3680ff2d-72b0-4d93-bf41-c55d3478688e,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:33:14.651872 env[1341]: time="2024-04-12T18:33:14.651792141Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:14.652033 env[1341]: time="2024-04-12T18:33:14.651833822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:14.652033 env[1341]: time="2024-04-12T18:33:14.651869782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:14.652139 env[1341]: time="2024-04-12T18:33:14.652050703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f pid=2567 runtime=io.containerd.runc.v2 Apr 12 18:33:14.664127 systemd[1]: Started cri-containerd-4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f.scope. Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.679000 audit: BPF prog-id=113 op=LOAD Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2567 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653839636235653165366162333165343538623933373639616138 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2567 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653839636235653165366162333165343538623933373639616138 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit: BPF prog-id=114 op=LOAD Apr 12 18:33:14.680000 audit[2576]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2567 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653839636235653165366162333165343538623933373639616138 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit: BPF prog-id=115 op=LOAD Apr 12 18:33:14.680000 audit[2576]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2567 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653839636235653165366162333165343538623933373639616138 Apr 12 18:33:14.680000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:33:14.680000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:14.680000 audit: BPF prog-id=116 op=LOAD Apr 12 18:33:14.680000 audit[2576]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2567 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:14.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653839636235653165366162333165343538623933373639616138 Apr 12 18:33:14.699876 env[1341]: time="2024-04-12T18:33:14.699824387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-xz9nj,Uid:3680ff2d-72b0-4d93-bf41-c55d3478688e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f\"" Apr 12 18:33:14.703115 env[1341]: time="2024-04-12T18:33:14.703088083Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:33:14.939477 kubelet[2476]: E0412 18:33:14.939283 2476 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:33:14.939477 kubelet[2476]: E0412 18:33:14.939381 2476 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-kube-proxy podName:133c7c81-b1ed-4bcb-bc4a-d79780da9b6c nodeName:}" failed. No retries permitted until 2024-04-12 18:33:15.43935977 +0000 UTC m=+16.086009796 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/133c7c81-b1ed-4bcb-bc4a-d79780da9b6c-kube-proxy") pod "kube-proxy-xh2rf" (UID: "133c7c81-b1ed-4bcb-bc4a-d79780da9b6c") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:33:15.580877 env[1341]: time="2024-04-12T18:33:15.580585585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xh2rf,Uid:133c7c81-b1ed-4bcb-bc4a-d79780da9b6c,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:15.617953 env[1341]: time="2024-04-12T18:33:15.617871772Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:15.617953 env[1341]: time="2024-04-12T18:33:15.617914652Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:15.618143 env[1341]: time="2024-04-12T18:33:15.617931332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:15.618143 env[1341]: time="2024-04-12T18:33:15.618042693Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/960a0bd02feac6fb12c3c2c67bac77e98e4b6b41a9b83e0b4e1848a374d4473f pid=2610 runtime=io.containerd.runc.v2 Apr 12 18:33:15.630548 systemd[1]: Started cri-containerd-960a0bd02feac6fb12c3c2c67bac77e98e4b6b41a9b83e0b4e1848a374d4473f.scope. Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.642000 audit: BPF prog-id=117 op=LOAD Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306130626430326665616336666231326333633263363762616337 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306130626430326665616336666231326333633263363762616337 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.643000 audit: BPF prog-id=118 op=LOAD Apr 12 18:33:15.643000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306130626430326665616336666231326333633263363762616337 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.644000 audit: BPF prog-id=119 op=LOAD Apr 12 18:33:15.644000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306130626430326665616336666231326333633263363762616337 Apr 12 18:33:15.645000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:33:15.645000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.645000 audit: BPF prog-id=120 op=LOAD Apr 12 18:33:15.645000 audit[2620]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2610 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936306130626430326665616336666231326333633263363762616337 Apr 12 18:33:15.658395 env[1341]: time="2024-04-12T18:33:15.658361415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xh2rf,Uid:133c7c81-b1ed-4bcb-bc4a-d79780da9b6c,Namespace:kube-system,Attempt:0,} returns sandbox id \"960a0bd02feac6fb12c3c2c67bac77e98e4b6b41a9b83e0b4e1848a374d4473f\"" Apr 12 18:33:15.661131 env[1341]: time="2024-04-12T18:33:15.661048868Z" level=info msg="CreateContainer within sandbox \"960a0bd02feac6fb12c3c2c67bac77e98e4b6b41a9b83e0b4e1848a374d4473f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:33:15.691804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1949858885.mount: Deactivated successfully. Apr 12 18:33:15.716900 env[1341]: time="2024-04-12T18:33:15.716850027Z" level=info msg="CreateContainer within sandbox \"960a0bd02feac6fb12c3c2c67bac77e98e4b6b41a9b83e0b4e1848a374d4473f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0642b679ff659b094c9b2217508649d074e99de0a2045c9f7651da2cf37ecf44\"" Apr 12 18:33:15.717554 env[1341]: time="2024-04-12T18:33:15.717507231Z" level=info msg="StartContainer for \"0642b679ff659b094c9b2217508649d074e99de0a2045c9f7651da2cf37ecf44\"" Apr 12 18:33:15.735735 systemd[1]: Started cri-containerd-0642b679ff659b094c9b2217508649d074e99de0a2045c9f7651da2cf37ecf44.scope. Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2610 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343262363739666636353962303934633962323231373530383634 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit: BPF prog-id=121 op=LOAD Apr 12 18:33:15.751000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2610 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343262363739666636353962303934633962323231373530383634 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit: BPF prog-id=122 op=LOAD Apr 12 18:33:15.751000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2610 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343262363739666636353962303934633962323231373530383634 Apr 12 18:33:15.751000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:33:15.751000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:15.751000 audit: BPF prog-id=123 op=LOAD Apr 12 18:33:15.751000 audit[2652]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2610 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343262363739666636353962303934633962323231373530383634 Apr 12 18:33:15.771020 env[1341]: time="2024-04-12T18:33:15.770972418Z" level=info msg="StartContainer for \"0642b679ff659b094c9b2217508649d074e99de0a2045c9f7651da2cf37ecf44\" returns successfully" Apr 12 18:33:15.818000 audit[2705]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.818000 audit[2705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb9c4370 a2=0 a3=1 items=0 ppid=2663 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:33:15.821000 audit[2706]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:15.821000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0b092b0 a2=0 a3=1 items=0 ppid=2663 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:33:15.824000 audit[2707]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.824000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc722b550 a2=0 a3=1 items=0 ppid=2663 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:33:15.825000 audit[2709]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.825000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd45a8370 a2=0 a3=1 items=0 ppid=2663 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:33:15.826000 audit[2708]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:15.826000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc3b2e30 a2=0 a3=1 items=0 ppid=2663 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:33:15.827000 audit[2710]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:15.827000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe496b060 a2=0 a3=1 items=0 ppid=2663 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:33:15.920000 audit[2711]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.920000 audit[2711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcd5f1eb0 a2=0 a3=1 items=0 ppid=2663 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:33:15.923000 audit[2713]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.923000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcda8d1f0 a2=0 a3=1 items=0 ppid=2663 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:33:15.927000 audit[2716]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.927000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffca08a40 a2=0 a3=1 items=0 ppid=2663 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:33:15.928000 audit[2717]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.928000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd34c0f20 a2=0 a3=1 items=0 ppid=2663 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:33:15.931000 audit[2719]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.931000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc74f8bc0 a2=0 a3=1 items=0 ppid=2663 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:33:15.932000 audit[2720]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.932000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfee1bc0 a2=0 a3=1 items=0 ppid=2663 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:33:15.934000 audit[2722]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.934000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff792120 a2=0 a3=1 items=0 ppid=2663 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:33:15.937000 audit[2725]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.937000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff72a9c80 a2=0 a3=1 items=0 ppid=2663 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:33:15.938000 audit[2726]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.938000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9cc7b30 a2=0 a3=1 items=0 ppid=2663 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:33:15.940000 audit[2728]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.940000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff8063a70 a2=0 a3=1 items=0 ppid=2663 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:33:15.941000 audit[2729]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.941000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc97d9590 a2=0 a3=1 items=0 ppid=2663 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:33:15.943000 audit[2731]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.943000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffff823200 a2=0 a3=1 items=0 ppid=2663 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:15.946000 audit[2734]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.946000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf534480 a2=0 a3=1 items=0 ppid=2663 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:15.951000 audit[2737]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.951000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe436e380 a2=0 a3=1 items=0 ppid=2663 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:33:15.952000 audit[2738]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.952000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffde218280 a2=0 a3=1 items=0 ppid=2663 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:33:15.955000 audit[2740]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.955000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd2080a90 a2=0 a3=1 items=0 ppid=2663 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:15.958000 audit[2743]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.958000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcf37ec80 a2=0 a3=1 items=0 ppid=2663 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:15.960000 audit[2744]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.960000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3efb8b0 a2=0 a3=1 items=0 ppid=2663 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:33:15.962000 audit[2746]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:33:15.962000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffed719c20 a2=0 a3=1 items=0 ppid=2663 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:33:15.995000 audit[2752]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:15.995000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffdea85c00 a2=0 a3=1 items=0 ppid=2663 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:15.995000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:16.012000 audit[2752]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:16.012000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffdea85c00 a2=0 a3=1 items=0 ppid=2663 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:16.014000 audit[2757]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.014000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffddfe84f0 a2=0 a3=1 items=0 ppid=2663 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:33:16.016000 audit[2759]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.016000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdb7c74a0 a2=0 a3=1 items=0 ppid=2663 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:33:16.021000 audit[2762]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.021000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdb7a49c0 a2=0 a3=1 items=0 ppid=2663 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:33:16.022000 audit[2763]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.022000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe88ad100 a2=0 a3=1 items=0 ppid=2663 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:33:16.024000 audit[2765]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.024000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcca95510 a2=0 a3=1 items=0 ppid=2663 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:33:16.025000 audit[2766]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.025000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd48836d0 a2=0 a3=1 items=0 ppid=2663 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:33:16.028000 audit[2768]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.028000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdc24ae30 a2=0 a3=1 items=0 ppid=2663 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:33:16.031000 audit[2771]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.031000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8835d70 a2=0 a3=1 items=0 ppid=2663 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:33:16.032000 audit[2772]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.032000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe7ccfe0 a2=0 a3=1 items=0 ppid=2663 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:33:16.034000 audit[2774]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.034000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef4b1480 a2=0 a3=1 items=0 ppid=2663 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:33:16.035000 audit[2775]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.035000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6893250 a2=0 a3=1 items=0 ppid=2663 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:33:16.038000 audit[2777]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.038000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde2feb40 a2=0 a3=1 items=0 ppid=2663 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:33:16.041000 audit[2780]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.041000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0d3aea0 a2=0 a3=1 items=0 ppid=2663 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:33:16.044000 audit[2783]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.044000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2706770 a2=0 a3=1 items=0 ppid=2663 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:33:16.045000 audit[2784]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.045000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff44ffc00 a2=0 a3=1 items=0 ppid=2663 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:33:16.047000 audit[2786]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.047000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe371ff10 a2=0 a3=1 items=0 ppid=2663 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:16.051000 audit[2789]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.051000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc96bb3c0 a2=0 a3=1 items=0 ppid=2663 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:33:16.052000 audit[2790]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.052000 audit[2790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0761860 a2=0 a3=1 items=0 ppid=2663 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:33:16.054000 audit[2792]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.054000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff5532ad0 a2=0 a3=1 items=0 ppid=2663 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:33:16.055000 audit[2793]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.055000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd0a88f0 a2=0 a3=1 items=0 ppid=2663 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:33:16.057000 audit[2795]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.057000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd6c23d60 a2=0 a3=1 items=0 ppid=2663 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:16.060000 audit[2798]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:33:16.060000 audit[2798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff87d5e60 a2=0 a3=1 items=0 ppid=2663 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:33:16.063000 audit[2800]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:33:16.063000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc99a7080 a2=0 a3=1 items=0 ppid=2663 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.063000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:16.063000 audit[2800]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:33:16.063000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc99a7080 a2=0 a3=1 items=0 ppid=2663 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:16.063000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:16.534036 kubelet[2476]: I0412 18:33:16.533870 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-xh2rf" podStartSLOduration=3.533814304 podStartE2EDuration="3.533814304s" podCreationTimestamp="2024-04-12 18:33:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:16.533812944 +0000 UTC m=+17.180463010" watchObservedRunningTime="2024-04-12 18:33:16.533814304 +0000 UTC m=+17.180464370" Apr 12 18:33:17.118531 env[1341]: time="2024-04-12T18:33:17.118483801Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:17.124518 env[1341]: time="2024-04-12T18:33:17.124484030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:17.127955 env[1341]: time="2024-04-12T18:33:17.127916567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:17.130905 env[1341]: time="2024-04-12T18:33:17.130872301Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:17.131537 env[1341]: time="2024-04-12T18:33:17.131508744Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:33:17.134793 env[1341]: time="2024-04-12T18:33:17.134729720Z" level=info msg="CreateContainer within sandbox \"4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:33:17.159493 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4270754532.mount: Deactivated successfully. Apr 12 18:33:17.165572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1729062628.mount: Deactivated successfully. Apr 12 18:33:17.176202 env[1341]: time="2024-04-12T18:33:17.176171079Z" level=info msg="CreateContainer within sandbox \"4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926\"" Apr 12 18:33:17.178043 env[1341]: time="2024-04-12T18:33:17.176661241Z" level=info msg="StartContainer for \"ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926\"" Apr 12 18:33:17.191177 systemd[1]: Started cri-containerd-ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926.scope. Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit: BPF prog-id=124 op=LOAD Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2567 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666539326537326331363330306165653461653561623831316138 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2567 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666539326537326331363330306165653461653561623831316138 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit: BPF prog-id=125 op=LOAD Apr 12 18:33:17.203000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2567 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666539326537326331363330306165653461653561623831316138 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.203000 audit: BPF prog-id=126 op=LOAD Apr 12 18:33:17.203000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2567 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666539326537326331363330306165653461653561623831316138 Apr 12 18:33:17.204000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:33:17.204000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { perfmon } for pid=2809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit[2809]: AVC avc: denied { bpf } for pid=2809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:17.204000 audit: BPF prog-id=127 op=LOAD Apr 12 18:33:17.204000 audit[2809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2567 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666539326537326331363330306165653461653561623831316138 Apr 12 18:33:17.220600 env[1341]: time="2024-04-12T18:33:17.220553773Z" level=info msg="StartContainer for \"ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926\" returns successfully" Apr 12 18:33:19.451745 kubelet[2476]: I0412 18:33:19.451709 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-xz9nj" podStartSLOduration=3.021042663 podStartE2EDuration="5.451671494s" podCreationTimestamp="2024-04-12 18:33:14 +0000 UTC" firstStartedPulling="2024-04-12 18:33:14.701155474 +0000 UTC m=+15.347805540" lastFinishedPulling="2024-04-12 18:33:17.131784345 +0000 UTC m=+17.778434371" observedRunningTime="2024-04-12 18:33:17.5296157 +0000 UTC m=+18.176265766" watchObservedRunningTime="2024-04-12 18:33:19.451671494 +0000 UTC m=+20.098321560" Apr 12 18:33:19.497000 audit[2841]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.503763 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 18:33:19.503825 kernel: audit: type=1325 audit(1712946799.497:1077): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.497000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffda6fc830 a2=0 a3=1 items=0 ppid=2663 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.545781 kernel: audit: type=1300 audit(1712946799.497:1077): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffda6fc830 a2=0 a3=1 items=0 ppid=2663 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.559656 kernel: audit: type=1327 audit(1712946799.497:1077): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.497000 audit[2841]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.497000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffda6fc830 a2=0 a3=1 items=0 ppid=2663 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.578939 kernel: audit: type=1325 audit(1712946799.497:1078): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.622139 kernel: audit: type=1300 audit(1712946799.497:1078): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffda6fc830 a2=0 a3=1 items=0 ppid=2663 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.622194 kernel: audit: type=1327 audit(1712946799.497:1078): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.578000 audit[2843]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.642185 kernel: audit: type=1325 audit(1712946799.578:1079): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.578000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffd7436b0 a2=0 a3=1 items=0 ppid=2663 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.671051 kernel: audit: type=1300 audit(1712946799.578:1079): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffd7436b0 a2=0 a3=1 items=0 ppid=2663 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.689725 kernel: audit: type=1327 audit(1712946799.578:1079): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.579000 audit[2843]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.709386 kernel: audit: type=1325 audit(1712946799.579:1080): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:19.709492 kubelet[2476]: I0412 18:33:19.698954 2476 topology_manager.go:215] "Topology Admit Handler" podUID="f1c5921d-0da0-4639-a3a4-28e374b08e16" podNamespace="calico-system" podName="calico-typha-957fbb74d-zx7vp" Apr 12 18:33:19.579000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffd7436b0 a2=0 a3=1 items=0 ppid=2663 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:19.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:19.717384 systemd[1]: Created slice kubepods-besteffort-podf1c5921d_0da0_4639_a3a4_28e374b08e16.slice. Apr 12 18:33:19.778679 kubelet[2476]: I0412 18:33:19.778646 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f1c5921d-0da0-4639-a3a4-28e374b08e16-typha-certs\") pod \"calico-typha-957fbb74d-zx7vp\" (UID: \"f1c5921d-0da0-4639-a3a4-28e374b08e16\") " pod="calico-system/calico-typha-957fbb74d-zx7vp" Apr 12 18:33:19.778904 kubelet[2476]: I0412 18:33:19.778738 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zwncs\" (UniqueName: \"kubernetes.io/projected/f1c5921d-0da0-4639-a3a4-28e374b08e16-kube-api-access-zwncs\") pod \"calico-typha-957fbb74d-zx7vp\" (UID: \"f1c5921d-0da0-4639-a3a4-28e374b08e16\") " pod="calico-system/calico-typha-957fbb74d-zx7vp" Apr 12 18:33:19.778904 kubelet[2476]: I0412 18:33:19.778763 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f1c5921d-0da0-4639-a3a4-28e374b08e16-tigera-ca-bundle\") pod \"calico-typha-957fbb74d-zx7vp\" (UID: \"f1c5921d-0da0-4639-a3a4-28e374b08e16\") " pod="calico-system/calico-typha-957fbb74d-zx7vp" Apr 12 18:33:19.800508 kubelet[2476]: I0412 18:33:19.800461 2476 topology_manager.go:215] "Topology Admit Handler" podUID="67e8c9ae-2d65-4339-90ff-1fa235252cbd" podNamespace="calico-system" podName="calico-node-gfm9m" Apr 12 18:33:19.805148 systemd[1]: Created slice kubepods-besteffort-pod67e8c9ae_2d65_4339_90ff_1fa235252cbd.slice. Apr 12 18:33:19.879263 kubelet[2476]: I0412 18:33:19.879214 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-policysync\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879263 kubelet[2476]: I0412 18:33:19.879265 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/67e8c9ae-2d65-4339-90ff-1fa235252cbd-node-certs\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879435 kubelet[2476]: I0412 18:33:19.879285 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-var-run-calico\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879435 kubelet[2476]: I0412 18:33:19.879307 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-lib-modules\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879435 kubelet[2476]: I0412 18:33:19.879343 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-97h8k\" (UniqueName: \"kubernetes.io/projected/67e8c9ae-2d65-4339-90ff-1fa235252cbd-kube-api-access-97h8k\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879435 kubelet[2476]: I0412 18:33:19.879371 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67e8c9ae-2d65-4339-90ff-1fa235252cbd-tigera-ca-bundle\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879435 kubelet[2476]: I0412 18:33:19.879391 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-cni-bin-dir\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879551 kubelet[2476]: I0412 18:33:19.879432 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-var-lib-calico\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879551 kubelet[2476]: I0412 18:33:19.879456 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-cni-net-dir\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879551 kubelet[2476]: I0412 18:33:19.879474 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-flexvol-driver-host\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879551 kubelet[2476]: I0412 18:33:19.879494 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-cni-log-dir\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.879551 kubelet[2476]: I0412 18:33:19.879513 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/67e8c9ae-2d65-4339-90ff-1fa235252cbd-xtables-lock\") pod \"calico-node-gfm9m\" (UID: \"67e8c9ae-2d65-4339-90ff-1fa235252cbd\") " pod="calico-system/calico-node-gfm9m" Apr 12 18:33:19.940768 kubelet[2476]: I0412 18:33:19.940726 2476 topology_manager.go:215] "Topology Admit Handler" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" podNamespace="calico-system" podName="csi-node-driver-tkttm" Apr 12 18:33:19.941086 kubelet[2476]: E0412 18:33:19.941067 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:19.981267 kubelet[2476]: I0412 18:33:19.981247 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2cc72342-8a28-4c74-94cd-b514ad57b5f3-kubelet-dir\") pod \"csi-node-driver-tkttm\" (UID: \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\") " pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:19.981466 kubelet[2476]: I0412 18:33:19.981454 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2cc72342-8a28-4c74-94cd-b514ad57b5f3-socket-dir\") pod \"csi-node-driver-tkttm\" (UID: \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\") " pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:19.981609 kubelet[2476]: I0412 18:33:19.981597 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j5zp7\" (UniqueName: \"kubernetes.io/projected/2cc72342-8a28-4c74-94cd-b514ad57b5f3-kube-api-access-j5zp7\") pod \"csi-node-driver-tkttm\" (UID: \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\") " pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:19.982736 kubelet[2476]: I0412 18:33:19.982212 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2cc72342-8a28-4c74-94cd-b514ad57b5f3-varrun\") pod \"csi-node-driver-tkttm\" (UID: \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\") " pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:19.982736 kubelet[2476]: I0412 18:33:19.982259 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2cc72342-8a28-4c74-94cd-b514ad57b5f3-registration-dir\") pod \"csi-node-driver-tkttm\" (UID: \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\") " pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:19.989938 kubelet[2476]: E0412 18:33:19.988945 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:19.989938 kubelet[2476]: W0412 18:33:19.988970 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:19.989938 kubelet[2476]: E0412 18:33:19.988999 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:19.990979 kubelet[2476]: E0412 18:33:19.990947 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:19.990979 kubelet[2476]: W0412 18:33:19.990965 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:19.990979 kubelet[2476]: E0412 18:33:19.990980 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.021927 env[1341]: time="2024-04-12T18:33:20.020099644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-957fbb74d-zx7vp,Uid:f1c5921d-0da0-4639-a3a4-28e374b08e16,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:20.022795 kubelet[2476]: E0412 18:33:20.022777 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.022912 kubelet[2476]: W0412 18:33:20.022898 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.023012 kubelet[2476]: E0412 18:33:20.023001 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.055285 env[1341]: time="2024-04-12T18:33:20.055214043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:20.055285 env[1341]: time="2024-04-12T18:33:20.055254844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:20.055538 env[1341]: time="2024-04-12T18:33:20.055265684Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:20.055769 env[1341]: time="2024-04-12T18:33:20.055725926Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cd2f05c2aaa627b00595a25b2276450bcc1a84db29b007392c2376330b320d8 pid=2860 runtime=io.containerd.runc.v2 Apr 12 18:33:20.077868 systemd[1]: Started cri-containerd-3cd2f05c2aaa627b00595a25b2276450bcc1a84db29b007392c2376330b320d8.scope. Apr 12 18:33:20.083464 kubelet[2476]: E0412 18:33:20.083310 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.083464 kubelet[2476]: W0412 18:33:20.083330 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.083464 kubelet[2476]: E0412 18:33:20.083350 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.083812 kubelet[2476]: E0412 18:33:20.083680 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.083812 kubelet[2476]: W0412 18:33:20.083691 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.083812 kubelet[2476]: E0412 18:33:20.083705 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.084147 kubelet[2476]: E0412 18:33:20.084012 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.084147 kubelet[2476]: W0412 18:33:20.084024 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.084147 kubelet[2476]: E0412 18:33:20.084039 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.084420 kubelet[2476]: E0412 18:33:20.084290 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.084420 kubelet[2476]: W0412 18:33:20.084301 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.084420 kubelet[2476]: E0412 18:33:20.084313 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.084714 kubelet[2476]: E0412 18:33:20.084575 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.084714 kubelet[2476]: W0412 18:33:20.084586 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.084714 kubelet[2476]: E0412 18:33:20.084600 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.084999 kubelet[2476]: E0412 18:33:20.084893 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.084999 kubelet[2476]: W0412 18:33:20.084905 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.084999 kubelet[2476]: E0412 18:33:20.084925 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.085274 kubelet[2476]: E0412 18:33:20.085170 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.085274 kubelet[2476]: W0412 18:33:20.085181 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.085274 kubelet[2476]: E0412 18:33:20.085195 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.085709 kubelet[2476]: E0412 18:33:20.085484 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.085709 kubelet[2476]: W0412 18:33:20.085498 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.085709 kubelet[2476]: E0412 18:33:20.085510 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.085975 kubelet[2476]: E0412 18:33:20.085891 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.085975 kubelet[2476]: W0412 18:33:20.085902 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.085975 kubelet[2476]: E0412 18:33:20.085941 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.086235 kubelet[2476]: E0412 18:33:20.086123 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.086235 kubelet[2476]: W0412 18:33:20.086133 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.086235 kubelet[2476]: E0412 18:33:20.086217 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.086507 kubelet[2476]: E0412 18:33:20.086385 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.086507 kubelet[2476]: W0412 18:33:20.086395 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.086507 kubelet[2476]: E0412 18:33:20.086459 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.086757 kubelet[2476]: E0412 18:33:20.086663 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.086757 kubelet[2476]: W0412 18:33:20.086673 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.086757 kubelet[2476]: E0412 18:33:20.086707 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.087047 kubelet[2476]: E0412 18:33:20.086960 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.087047 kubelet[2476]: W0412 18:33:20.086971 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.087047 kubelet[2476]: E0412 18:33:20.087012 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.087238 kubelet[2476]: E0412 18:33:20.087192 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.087238 kubelet[2476]: W0412 18:33:20.087202 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.087238 kubelet[2476]: E0412 18:33:20.087222 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087378 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.087812 kubelet[2476]: W0412 18:33:20.087402 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087424 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087569 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.087812 kubelet[2476]: W0412 18:33:20.087578 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087592 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087742 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.087812 kubelet[2476]: W0412 18:33:20.087757 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.087812 kubelet[2476]: E0412 18:33:20.087768 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088080 kubelet[2476]: E0412 18:33:20.087911 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088080 kubelet[2476]: W0412 18:33:20.087919 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088080 kubelet[2476]: E0412 18:33:20.087931 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088080 kubelet[2476]: E0412 18:33:20.088034 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088080 kubelet[2476]: W0412 18:33:20.088040 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088080 kubelet[2476]: E0412 18:33:20.088049 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088206 kubelet[2476]: E0412 18:33:20.088178 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088206 kubelet[2476]: W0412 18:33:20.088185 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088206 kubelet[2476]: E0412 18:33:20.088194 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088328 kubelet[2476]: E0412 18:33:20.088309 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088328 kubelet[2476]: W0412 18:33:20.088323 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088405 kubelet[2476]: E0412 18:33:20.088339 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088475 kubelet[2476]: E0412 18:33:20.088459 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088475 kubelet[2476]: W0412 18:33:20.088471 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088722 kubelet[2476]: E0412 18:33:20.088575 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.088722 kubelet[2476]: E0412 18:33:20.088579 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.088722 kubelet[2476]: W0412 18:33:20.088615 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.088722 kubelet[2476]: E0412 18:33:20.088627 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.089138 kubelet[2476]: E0412 18:33:20.089011 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.089138 kubelet[2476]: W0412 18:33:20.089023 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.089138 kubelet[2476]: E0412 18:33:20.089039 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.089491 kubelet[2476]: E0412 18:33:20.089284 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.089491 kubelet[2476]: W0412 18:33:20.089294 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.089491 kubelet[2476]: E0412 18:33:20.089306 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.113106 kubelet[2476]: E0412 18:33:20.113086 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:20.113219 kubelet[2476]: W0412 18:33:20.113206 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:20.113289 kubelet[2476]: E0412 18:33:20.113280 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:20.115049 env[1341]: time="2024-04-12T18:33:20.115009035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gfm9m,Uid:67e8c9ae-2d65-4339-90ff-1fa235252cbd,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit: BPF prog-id=128 op=LOAD Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2860 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643266303563326161613632376230303539356132356232323736 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2860 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643266303563326161613632376230303539356132356232323736 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit: BPF prog-id=129 op=LOAD Apr 12 18:33:20.126000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2860 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643266303563326161613632376230303539356132356232323736 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit: BPF prog-id=130 op=LOAD Apr 12 18:33:20.126000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2860 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643266303563326161613632376230303539356132356232323736 Apr 12 18:33:20.126000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:33:20.126000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.126000 audit: BPF prog-id=131 op=LOAD Apr 12 18:33:20.126000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2860 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643266303563326161613632376230303539356132356232323736 Apr 12 18:33:20.147595 env[1341]: time="2024-04-12T18:33:20.147549383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-957fbb74d-zx7vp,Uid:f1c5921d-0da0-4639-a3a4-28e374b08e16,Namespace:calico-system,Attempt:0,} returns sandbox id \"3cd2f05c2aaa627b00595a25b2276450bcc1a84db29b007392c2376330b320d8\"" Apr 12 18:33:20.149690 env[1341]: time="2024-04-12T18:33:20.149666233Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:33:20.160644 env[1341]: time="2024-04-12T18:33:20.160573642Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:20.160644 env[1341]: time="2024-04-12T18:33:20.160611722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:20.160819 env[1341]: time="2024-04-12T18:33:20.160777643Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:20.161104 env[1341]: time="2024-04-12T18:33:20.161052124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21 pid=2925 runtime=io.containerd.runc.v2 Apr 12 18:33:20.179087 systemd[1]: Started cri-containerd-6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21.scope. Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.194000 audit: BPF prog-id=132 op=LOAD Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323430393930313766613237393936323232366631393833323130 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323430393930313766613237393936323232366631393833323130 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit: BPF prog-id=133 op=LOAD Apr 12 18:33:20.195000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323430393930313766613237393936323232366631393833323130 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit: BPF prog-id=134 op=LOAD Apr 12 18:33:20.195000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323430393930313766613237393936323232366631393833323130 Apr 12 18:33:20.195000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:33:20.195000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:20.195000 audit: BPF prog-id=135 op=LOAD Apr 12 18:33:20.195000 audit[2935]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636323430393930313766613237393936323232366631393833323130 Apr 12 18:33:20.211980 env[1341]: time="2024-04-12T18:33:20.211947436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gfm9m,Uid:67e8c9ae-2d65-4339-90ff-1fa235252cbd,Namespace:calico-system,Attempt:0,} returns sandbox id \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\"" Apr 12 18:33:20.629000 audit[2959]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:20.629000 audit[2959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc8dbed50 a2=0 a3=1 items=0 ppid=2663 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:20.630000 audit[2959]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:20.630000 audit[2959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc8dbed50 a2=0 a3=1 items=0 ppid=2663 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:20.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:21.270344 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2345372926.mount: Deactivated successfully. Apr 12 18:33:21.441190 kubelet[2476]: E0412 18:33:21.440708 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:21.976877 env[1341]: time="2024-04-12T18:33:21.976813293Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.982949 env[1341]: time="2024-04-12T18:33:21.982903960Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.985929 env[1341]: time="2024-04-12T18:33:21.985901213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.988513 env[1341]: time="2024-04-12T18:33:21.988476905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:21.989106 env[1341]: time="2024-04-12T18:33:21.989072947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:33:21.989791 env[1341]: time="2024-04-12T18:33:21.989758590Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:33:22.000279 env[1341]: time="2024-04-12T18:33:21.999934076Z" level=info msg="CreateContainer within sandbox \"3cd2f05c2aaa627b00595a25b2276450bcc1a84db29b007392c2376330b320d8\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:33:22.021739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4118657789.mount: Deactivated successfully. Apr 12 18:33:22.035680 env[1341]: time="2024-04-12T18:33:22.035602432Z" level=info msg="CreateContainer within sandbox \"3cd2f05c2aaa627b00595a25b2276450bcc1a84db29b007392c2376330b320d8\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0f031b24243ed6bdf146498280a1dccca9cb162283f9584d23e849e39b04f3f1\"" Apr 12 18:33:22.036457 env[1341]: time="2024-04-12T18:33:22.036425795Z" level=info msg="StartContainer for \"0f031b24243ed6bdf146498280a1dccca9cb162283f9584d23e849e39b04f3f1\"" Apr 12 18:33:22.058251 systemd[1]: Started cri-containerd-0f031b24243ed6bdf146498280a1dccca9cb162283f9584d23e849e39b04f3f1.scope. Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.069000 audit: BPF prog-id=136 op=LOAD Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2860 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066303331623234323433656436626466313436343938323830613164 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2860 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066303331623234323433656436626466313436343938323830613164 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit: BPF prog-id=137 op=LOAD Apr 12 18:33:22.072000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2860 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066303331623234323433656436626466313436343938323830613164 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit: BPF prog-id=138 op=LOAD Apr 12 18:33:22.072000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2860 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066303331623234323433656436626466313436343938323830613164 Apr 12 18:33:22.072000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:33:22.072000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { perfmon } for pid=2969 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit[2969]: AVC avc: denied { bpf } for pid=2969 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:22.072000 audit: BPF prog-id=139 op=LOAD Apr 12 18:33:22.072000 audit[2969]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2860 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066303331623234323433656436626466313436343938323830613164 Apr 12 18:33:22.095718 env[1341]: time="2024-04-12T18:33:22.095670575Z" level=info msg="StartContainer for \"0f031b24243ed6bdf146498280a1dccca9cb162283f9584d23e849e39b04f3f1\" returns successfully" Apr 12 18:33:22.563546 kubelet[2476]: E0412 18:33:22.563516 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.563546 kubelet[2476]: W0412 18:33:22.563537 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.563546 kubelet[2476]: E0412 18:33:22.563555 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.563946 kubelet[2476]: E0412 18:33:22.563694 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.563946 kubelet[2476]: W0412 18:33:22.563702 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.563946 kubelet[2476]: E0412 18:33:22.563717 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.563946 kubelet[2476]: E0412 18:33:22.563834 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.563946 kubelet[2476]: W0412 18:33:22.563870 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.563946 kubelet[2476]: E0412 18:33:22.563884 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564075 kubelet[2476]: E0412 18:33:22.564012 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564075 kubelet[2476]: W0412 18:33:22.564019 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564075 kubelet[2476]: E0412 18:33:22.564031 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564169 kubelet[2476]: E0412 18:33:22.564148 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564169 kubelet[2476]: W0412 18:33:22.564164 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564243 kubelet[2476]: E0412 18:33:22.564175 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564311 kubelet[2476]: E0412 18:33:22.564298 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564311 kubelet[2476]: W0412 18:33:22.564310 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564378 kubelet[2476]: E0412 18:33:22.564320 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564466 kubelet[2476]: E0412 18:33:22.564453 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564466 kubelet[2476]: W0412 18:33:22.564464 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564535 kubelet[2476]: E0412 18:33:22.564475 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564600 kubelet[2476]: E0412 18:33:22.564588 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564600 kubelet[2476]: W0412 18:33:22.564599 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564671 kubelet[2476]: E0412 18:33:22.564607 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564740 kubelet[2476]: E0412 18:33:22.564728 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564740 kubelet[2476]: W0412 18:33:22.564738 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564892 kubelet[2476]: E0412 18:33:22.564748 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.564892 kubelet[2476]: E0412 18:33:22.564873 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.564892 kubelet[2476]: W0412 18:33:22.564885 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.564973 kubelet[2476]: E0412 18:33:22.564896 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.565025 kubelet[2476]: E0412 18:33:22.565004 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.565025 kubelet[2476]: W0412 18:33:22.565016 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.565025 kubelet[2476]: E0412 18:33:22.565026 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.565146 kubelet[2476]: E0412 18:33:22.565134 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.565146 kubelet[2476]: W0412 18:33:22.565143 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.565210 kubelet[2476]: E0412 18:33:22.565153 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.565279 kubelet[2476]: E0412 18:33:22.565266 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.565279 kubelet[2476]: W0412 18:33:22.565276 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.565344 kubelet[2476]: E0412 18:33:22.565285 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.565413 kubelet[2476]: E0412 18:33:22.565401 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.565413 kubelet[2476]: W0412 18:33:22.565412 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.565490 kubelet[2476]: E0412 18:33:22.565422 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.565544 kubelet[2476]: E0412 18:33:22.565528 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.565544 kubelet[2476]: W0412 18:33:22.565540 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.565609 kubelet[2476]: E0412 18:33:22.565551 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.600913 kubelet[2476]: E0412 18:33:22.600889 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.601060 kubelet[2476]: W0412 18:33:22.601045 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.601161 kubelet[2476]: E0412 18:33:22.601150 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.601486 kubelet[2476]: E0412 18:33:22.601473 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.601585 kubelet[2476]: W0412 18:33:22.601573 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.601666 kubelet[2476]: E0412 18:33:22.601657 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.601939 kubelet[2476]: E0412 18:33:22.601919 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.601939 kubelet[2476]: W0412 18:33:22.601935 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.602047 kubelet[2476]: E0412 18:33:22.601955 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.602250 kubelet[2476]: E0412 18:33:22.602228 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.602250 kubelet[2476]: W0412 18:33:22.602248 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.602334 kubelet[2476]: E0412 18:33:22.602269 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.602436 kubelet[2476]: E0412 18:33:22.602415 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.602436 kubelet[2476]: W0412 18:33:22.602428 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.602490 kubelet[2476]: E0412 18:33:22.602440 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.602650 kubelet[2476]: E0412 18:33:22.602634 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.602710 kubelet[2476]: W0412 18:33:22.602647 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.602710 kubelet[2476]: E0412 18:33:22.602672 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.602972 kubelet[2476]: E0412 18:33:22.602959 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.603064 kubelet[2476]: W0412 18:33:22.603043 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.603143 kubelet[2476]: E0412 18:33:22.603133 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.603335 kubelet[2476]: E0412 18:33:22.603314 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.603335 kubelet[2476]: W0412 18:33:22.603327 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.603427 kubelet[2476]: E0412 18:33:22.603349 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.603605 kubelet[2476]: E0412 18:33:22.603581 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.603605 kubelet[2476]: W0412 18:33:22.603605 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.603695 kubelet[2476]: E0412 18:33:22.603624 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.603775 kubelet[2476]: E0412 18:33:22.603762 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.603775 kubelet[2476]: W0412 18:33:22.603773 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.603879 kubelet[2476]: E0412 18:33:22.603789 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.604055 kubelet[2476]: E0412 18:33:22.604039 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.604055 kubelet[2476]: W0412 18:33:22.604053 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.604171 kubelet[2476]: E0412 18:33:22.604157 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.604316 kubelet[2476]: E0412 18:33:22.604191 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.604316 kubelet[2476]: W0412 18:33:22.604308 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.604454 kubelet[2476]: E0412 18:33:22.604437 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.604454 kubelet[2476]: W0412 18:33:22.604448 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.604518 kubelet[2476]: E0412 18:33:22.604460 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.604631 kubelet[2476]: E0412 18:33:22.604620 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.604814 kubelet[2476]: E0412 18:33:22.604798 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.604814 kubelet[2476]: W0412 18:33:22.604810 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.604913 kubelet[2476]: E0412 18:33:22.604828 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.604996 kubelet[2476]: E0412 18:33:22.604978 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.604996 kubelet[2476]: W0412 18:33:22.604991 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.604996 kubelet[2476]: E0412 18:33:22.605003 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.605220 kubelet[2476]: E0412 18:33:22.605206 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.605220 kubelet[2476]: W0412 18:33:22.605217 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.605298 kubelet[2476]: E0412 18:33:22.605234 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.605504 kubelet[2476]: E0412 18:33:22.605491 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.605580 kubelet[2476]: W0412 18:33:22.605567 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.605645 kubelet[2476]: E0412 18:33:22.605636 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:22.605932 kubelet[2476]: E0412 18:33:22.605911 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:33:22.606032 kubelet[2476]: W0412 18:33:22.606009 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:33:22.606096 kubelet[2476]: E0412 18:33:22.606087 2476 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:33:23.078603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1261860780.mount: Deactivated successfully. Apr 12 18:33:23.226054 env[1341]: time="2024-04-12T18:33:23.226014026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.232611 env[1341]: time="2024-04-12T18:33:23.232586775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.236125 env[1341]: time="2024-04-12T18:33:23.236082590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.239827 env[1341]: time="2024-04-12T18:33:23.239800966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:23.240356 env[1341]: time="2024-04-12T18:33:23.240321728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:33:23.243388 env[1341]: time="2024-04-12T18:33:23.243338821Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:33:23.265228 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3689233655.mount: Deactivated successfully. Apr 12 18:33:23.280850 env[1341]: time="2024-04-12T18:33:23.280809742Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e\"" Apr 12 18:33:23.281319 env[1341]: time="2024-04-12T18:33:23.281295984Z" level=info msg="StartContainer for \"18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e\"" Apr 12 18:33:23.298525 systemd[1]: Started cri-containerd-18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e.scope. Apr 12 18:33:23.311000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.311000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2925 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313834646137636632316639633034623331376630616536376265 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit: BPF prog-id=140 op=LOAD Apr 12 18:33:23.312000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2925 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313834646137636632316639633034623331376630616536376265 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.312000 audit: BPF prog-id=141 op=LOAD Apr 12 18:33:23.312000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2925 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313834646137636632316639633034623331376630616536376265 Apr 12 18:33:23.313000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:33:23.313000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:23.313000 audit: BPF prog-id=142 op=LOAD Apr 12 18:33:23.313000 audit[3041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2925 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:23.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138313834646137636632316639633034623331376630616536376265 Apr 12 18:33:23.331294 env[1341]: time="2024-04-12T18:33:23.331208799Z" level=info msg="StartContainer for \"18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e\" returns successfully" Apr 12 18:33:23.337607 systemd[1]: cri-containerd-18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e.scope: Deactivated successfully. Apr 12 18:33:23.341000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:33:23.440178 kubelet[2476]: E0412 18:33:23.440144 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:23.534876 kubelet[2476]: I0412 18:33:23.534653 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:33:23.547127 kubelet[2476]: I0412 18:33:23.547087 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-957fbb74d-zx7vp" podStartSLOduration=2.7068591680000003 podStartE2EDuration="4.547041087s" podCreationTimestamp="2024-04-12 18:33:19 +0000 UTC" firstStartedPulling="2024-04-12 18:33:20.14920151 +0000 UTC m=+20.795851536" lastFinishedPulling="2024-04-12 18:33:21.989383389 +0000 UTC m=+22.636033455" observedRunningTime="2024-04-12 18:33:22.54215425 +0000 UTC m=+23.188804276" watchObservedRunningTime="2024-04-12 18:33:23.547041087 +0000 UTC m=+24.193691113" Apr 12 18:33:23.998387 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e-rootfs.mount: Deactivated successfully. Apr 12 18:33:24.173020 env[1341]: time="2024-04-12T18:33:24.172973605Z" level=info msg="shim disconnected" id=18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e Apr 12 18:33:24.173206 env[1341]: time="2024-04-12T18:33:24.173188246Z" level=warning msg="cleaning up after shim disconnected" id=18184da7cf21f9c04b317f0ae67be7137549f10150cdd9e1575ba7e84da3209e namespace=k8s.io Apr 12 18:33:24.173261 env[1341]: time="2024-04-12T18:33:24.173250246Z" level=info msg="cleaning up dead shim" Apr 12 18:33:24.180160 env[1341]: time="2024-04-12T18:33:24.180123115Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:33:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3086 runtime=io.containerd.runc.v2\n" Apr 12 18:33:24.537956 env[1341]: time="2024-04-12T18:33:24.537912467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:33:25.442194 kubelet[2476]: E0412 18:33:25.442153 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:25.565998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1611560814.mount: Deactivated successfully. Apr 12 18:33:27.444237 kubelet[2476]: E0412 18:33:27.440697 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:27.601312 env[1341]: time="2024-04-12T18:33:27.601262297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.606693 env[1341]: time="2024-04-12T18:33:27.606652919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.610070 env[1341]: time="2024-04-12T18:33:27.610031532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.613918 env[1341]: time="2024-04-12T18:33:27.613891388Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:27.614473 env[1341]: time="2024-04-12T18:33:27.614443230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:33:27.616925 env[1341]: time="2024-04-12T18:33:27.616582879Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:33:27.641215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2182044192.mount: Deactivated successfully. Apr 12 18:33:27.655190 env[1341]: time="2024-04-12T18:33:27.655140673Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8\"" Apr 12 18:33:27.656866 env[1341]: time="2024-04-12T18:33:27.655976957Z" level=info msg="StartContainer for \"8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8\"" Apr 12 18:33:27.679724 systemd[1]: Started cri-containerd-8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8.scope. Apr 12 18:33:27.681236 systemd[1]: run-containerd-runc-k8s.io-8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8-runc.TEWefO.mount: Deactivated successfully. Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.703718 kernel: kauditd_printk_skb: 223 callbacks suppressed Apr 12 18:33:27.703810 kernel: audit: type=1400 audit(1712946807.697:1144): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2925 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.749433 kernel: audit: type=1300 audit(1712946807.697:1144): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2925 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643763646262313339663133366137316664353334383863303537 Apr 12 18:33:27.774351 kernel: audit: type=1327 audit(1712946807.697:1144): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643763646262313339663133366137316664353334383863303537 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.792183 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.811904 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.829525 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.830316 env[1341]: time="2024-04-12T18:33:27.830263575Z" level=info msg="StartContainer for \"8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8\" returns successfully" Apr 12 18:33:27.847660 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.866223 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.884119 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.902017 kernel: audit: type=1400 audit(1712946807.697:1145): avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.697000 audit: BPF prog-id=143 op=LOAD Apr 12 18:33:27.697000 audit[3108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2925 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643763646262313339663133366137316664353334383863303537 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.702000 audit: BPF prog-id=144 op=LOAD Apr 12 18:33:27.702000 audit[3108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2925 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643763646262313339663133366137316664353334383863303537 Apr 12 18:33:27.721000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:33:27.721000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { perfmon } for pid=3108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit[3108]: AVC avc: denied { bpf } for pid=3108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:27.721000 audit: BPF prog-id=145 op=LOAD Apr 12 18:33:27.721000 audit[3108]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2925 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:27.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861643763646262313339663133366137316664353334383863303537 Apr 12 18:33:29.146937 env[1341]: time="2024-04-12T18:33:29.146628887Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:33:29.148710 systemd[1]: cri-containerd-8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8.scope: Deactivated successfully. Apr 12 18:33:29.152000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:33:29.166392 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8-rootfs.mount: Deactivated successfully. Apr 12 18:33:29.235460 kubelet[2476]: I0412 18:33:29.235239 2476 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:33:29.319936 kubelet[2476]: I0412 18:33:29.257915 2476 topology_manager.go:215] "Topology Admit Handler" podUID="cf892adf-5ceb-4d1f-95b5-789ab1b37df3" podNamespace="kube-system" podName="coredns-76f75df574-5rp49" Apr 12 18:33:29.319936 kubelet[2476]: I0412 18:33:29.262826 2476 topology_manager.go:215] "Topology Admit Handler" podUID="16a4c0dd-7378-4de2-8821-a7e58b25cedd" podNamespace="kube-system" podName="coredns-76f75df574-6gsmc" Apr 12 18:33:29.319936 kubelet[2476]: I0412 18:33:29.266911 2476 topology_manager.go:215] "Topology Admit Handler" podUID="e8d0da91-a8ae-44dd-a9f1-db1ae63d2230" podNamespace="calico-system" podName="calico-kube-controllers-6b88c7fbd9-hzz78" Apr 12 18:33:29.264174 systemd[1]: Created slice kubepods-burstable-podcf892adf_5ceb_4d1f_95b5_789ab1b37df3.slice. Apr 12 18:33:29.272686 systemd[1]: Created slice kubepods-burstable-pod16a4c0dd_7378_4de2_8821_a7e58b25cedd.slice. Apr 12 18:33:29.276284 systemd[1]: Created slice kubepods-besteffort-pode8d0da91_a8ae_44dd_a9f1_db1ae63d2230.slice. Apr 12 18:33:29.357100 kubelet[2476]: I0412 18:33:29.357059 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4wgxl\" (UniqueName: \"kubernetes.io/projected/16a4c0dd-7378-4de2-8821-a7e58b25cedd-kube-api-access-4wgxl\") pod \"coredns-76f75df574-6gsmc\" (UID: \"16a4c0dd-7378-4de2-8821-a7e58b25cedd\") " pod="kube-system/coredns-76f75df574-6gsmc" Apr 12 18:33:29.357248 kubelet[2476]: I0412 18:33:29.357122 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cf892adf-5ceb-4d1f-95b5-789ab1b37df3-config-volume\") pod \"coredns-76f75df574-5rp49\" (UID: \"cf892adf-5ceb-4d1f-95b5-789ab1b37df3\") " pod="kube-system/coredns-76f75df574-5rp49" Apr 12 18:33:29.357248 kubelet[2476]: I0412 18:33:29.357149 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e8d0da91-a8ae-44dd-a9f1-db1ae63d2230-tigera-ca-bundle\") pod \"calico-kube-controllers-6b88c7fbd9-hzz78\" (UID: \"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230\") " pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" Apr 12 18:33:29.357248 kubelet[2476]: I0412 18:33:29.357202 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fx9tm\" (UniqueName: \"kubernetes.io/projected/cf892adf-5ceb-4d1f-95b5-789ab1b37df3-kube-api-access-fx9tm\") pod \"coredns-76f75df574-5rp49\" (UID: \"cf892adf-5ceb-4d1f-95b5-789ab1b37df3\") " pod="kube-system/coredns-76f75df574-5rp49" Apr 12 18:33:29.357248 kubelet[2476]: I0412 18:33:29.357226 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/16a4c0dd-7378-4de2-8821-a7e58b25cedd-config-volume\") pod \"coredns-76f75df574-6gsmc\" (UID: \"16a4c0dd-7378-4de2-8821-a7e58b25cedd\") " pod="kube-system/coredns-76f75df574-6gsmc" Apr 12 18:33:29.357351 kubelet[2476]: I0412 18:33:29.357286 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7vc7r\" (UniqueName: \"kubernetes.io/projected/e8d0da91-a8ae-44dd-a9f1-db1ae63d2230-kube-api-access-7vc7r\") pod \"calico-kube-controllers-6b88c7fbd9-hzz78\" (UID: \"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230\") " pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" Apr 12 18:33:29.446044 systemd[1]: Created slice kubepods-besteffort-pod2cc72342_8a28_4c74_94cd_b514ad57b5f3.slice. Apr 12 18:33:29.448558 env[1341]: time="2024-04-12T18:33:29.448202056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tkttm,Uid:2cc72342-8a28-4c74-94cd-b514ad57b5f3,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:29.622698 env[1341]: time="2024-04-12T18:33:29.622471211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6gsmc,Uid:16a4c0dd-7378-4de2-8821-a7e58b25cedd,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:29.623204 env[1341]: time="2024-04-12T18:33:29.623172654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5rp49,Uid:cf892adf-5ceb-4d1f-95b5-789ab1b37df3,Namespace:kube-system,Attempt:0,}" Apr 12 18:33:29.624235 env[1341]: time="2024-04-12T18:33:29.623989777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b88c7fbd9-hzz78,Uid:e8d0da91-a8ae-44dd-a9f1-db1ae63d2230,Namespace:calico-system,Attempt:0,}" Apr 12 18:33:29.778738 env[1341]: time="2024-04-12T18:33:29.778689257Z" level=info msg="shim disconnected" id=8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8 Apr 12 18:33:29.778738 env[1341]: time="2024-04-12T18:33:29.778732657Z" level=warning msg="cleaning up after shim disconnected" id=8ad7cdbb139f136a71fd53488c057847856c3cb81361e8562717c7ee26cde5d8 namespace=k8s.io Apr 12 18:33:29.778738 env[1341]: time="2024-04-12T18:33:29.778742497Z" level=info msg="cleaning up dead shim" Apr 12 18:33:29.786982 env[1341]: time="2024-04-12T18:33:29.786944969Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:33:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3151 runtime=io.containerd.runc.v2\n" Apr 12 18:33:29.939031 env[1341]: time="2024-04-12T18:33:29.938957358Z" level=error msg="Failed to destroy network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.939367 env[1341]: time="2024-04-12T18:33:29.939331400Z" level=error msg="encountered an error cleaning up failed sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.939432 env[1341]: time="2024-04-12T18:33:29.939388160Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tkttm,Uid:2cc72342-8a28-4c74-94cd-b514ad57b5f3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.939636 kubelet[2476]: E0412 18:33:29.939607 2476 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.939697 kubelet[2476]: E0412 18:33:29.939671 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:29.939697 kubelet[2476]: E0412 18:33:29.939692 2476 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tkttm" Apr 12 18:33:29.939777 kubelet[2476]: E0412 18:33:29.939758 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tkttm_calico-system(2cc72342-8a28-4c74-94cd-b514ad57b5f3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tkttm_calico-system(2cc72342-8a28-4c74-94cd-b514ad57b5f3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:29.956311 env[1341]: time="2024-04-12T18:33:29.956257786Z" level=error msg="Failed to destroy network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.956729 env[1341]: time="2024-04-12T18:33:29.956700027Z" level=error msg="encountered an error cleaning up failed sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.956896 env[1341]: time="2024-04-12T18:33:29.956867548Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6gsmc,Uid:16a4c0dd-7378-4de2-8821-a7e58b25cedd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.957203 kubelet[2476]: E0412 18:33:29.957162 2476 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.957278 kubelet[2476]: E0412 18:33:29.957229 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-6gsmc" Apr 12 18:33:29.957278 kubelet[2476]: E0412 18:33:29.957252 2476 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-6gsmc" Apr 12 18:33:29.957337 kubelet[2476]: E0412 18:33:29.957310 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-6gsmc_kube-system(16a4c0dd-7378-4de2-8821-a7e58b25cedd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-6gsmc_kube-system(16a4c0dd-7378-4de2-8821-a7e58b25cedd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-6gsmc" podUID="16a4c0dd-7378-4de2-8821-a7e58b25cedd" Apr 12 18:33:29.962638 env[1341]: time="2024-04-12T18:33:29.962596170Z" level=error msg="Failed to destroy network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.962976 env[1341]: time="2024-04-12T18:33:29.962941411Z" level=error msg="encountered an error cleaning up failed sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.963025 env[1341]: time="2024-04-12T18:33:29.962992292Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b88c7fbd9-hzz78,Uid:e8d0da91-a8ae-44dd-a9f1-db1ae63d2230,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.963177 kubelet[2476]: E0412 18:33:29.963147 2476 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.963228 kubelet[2476]: E0412 18:33:29.963195 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" Apr 12 18:33:29.963228 kubelet[2476]: E0412 18:33:29.963213 2476 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" Apr 12 18:33:29.963279 kubelet[2476]: E0412 18:33:29.963251 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6b88c7fbd9-hzz78_calico-system(e8d0da91-a8ae-44dd-a9f1-db1ae63d2230)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6b88c7fbd9-hzz78_calico-system(e8d0da91-a8ae-44dd-a9f1-db1ae63d2230)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" podUID="e8d0da91-a8ae-44dd-a9f1-db1ae63d2230" Apr 12 18:33:29.965753 env[1341]: time="2024-04-12T18:33:29.965708542Z" level=error msg="Failed to destroy network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.966088 env[1341]: time="2024-04-12T18:33:29.966050264Z" level=error msg="encountered an error cleaning up failed sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.966131 env[1341]: time="2024-04-12T18:33:29.966100344Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5rp49,Uid:cf892adf-5ceb-4d1f-95b5-789ab1b37df3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.966271 kubelet[2476]: E0412 18:33:29.966243 2476 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:29.966312 kubelet[2476]: E0412 18:33:29.966286 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5rp49" Apr 12 18:33:29.966312 kubelet[2476]: E0412 18:33:29.966303 2476 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5rp49" Apr 12 18:33:29.966399 kubelet[2476]: E0412 18:33:29.966340 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-5rp49_kube-system(cf892adf-5ceb-4d1f-95b5-789ab1b37df3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-5rp49_kube-system(cf892adf-5ceb-4d1f-95b5-789ab1b37df3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5rp49" podUID="cf892adf-5ceb-4d1f-95b5-789ab1b37df3" Apr 12 18:33:30.167567 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685-shm.mount: Deactivated successfully. Apr 12 18:33:30.549917 kubelet[2476]: I0412 18:33:30.549881 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:30.551363 env[1341]: time="2024-04-12T18:33:30.551264698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:33:30.556901 kubelet[2476]: I0412 18:33:30.556553 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:30.558273 env[1341]: time="2024-04-12T18:33:30.552660703Z" level=info msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" Apr 12 18:33:30.558366 env[1341]: time="2024-04-12T18:33:30.557033960Z" level=info msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" Apr 12 18:33:30.564986 kubelet[2476]: I0412 18:33:30.564956 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:30.565415 env[1341]: time="2024-04-12T18:33:30.565390712Z" level=info msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" Apr 12 18:33:30.571895 kubelet[2476]: I0412 18:33:30.570711 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:30.572586 env[1341]: time="2024-04-12T18:33:30.572547499Z" level=info msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" Apr 12 18:33:30.613465 env[1341]: time="2024-04-12T18:33:30.613402735Z" level=error msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" failed" error="failed to destroy network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:30.613854 kubelet[2476]: E0412 18:33:30.613802 2476 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:30.613938 kubelet[2476]: E0412 18:33:30.613897 2476 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e"} Apr 12 18:33:30.613938 kubelet[2476]: E0412 18:33:30.613934 2476 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:30.614033 kubelet[2476]: E0412 18:33:30.613963 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" podUID="e8d0da91-a8ae-44dd-a9f1-db1ae63d2230" Apr 12 18:33:30.623499 env[1341]: time="2024-04-12T18:33:30.623452453Z" level=error msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" failed" error="failed to destroy network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:30.623995 kubelet[2476]: E0412 18:33:30.623827 2476 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:30.623995 kubelet[2476]: E0412 18:33:30.623884 2476 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a"} Apr 12 18:33:30.623995 kubelet[2476]: E0412 18:33:30.623947 2476 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf892adf-5ceb-4d1f-95b5-789ab1b37df3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:30.623995 kubelet[2476]: E0412 18:33:30.623975 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf892adf-5ceb-4d1f-95b5-789ab1b37df3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5rp49" podUID="cf892adf-5ceb-4d1f-95b5-789ab1b37df3" Apr 12 18:33:30.625477 env[1341]: time="2024-04-12T18:33:30.625430501Z" level=error msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" failed" error="failed to destroy network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:30.625608 kubelet[2476]: E0412 18:33:30.625578 2476 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:30.625608 kubelet[2476]: E0412 18:33:30.625606 2476 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685"} Apr 12 18:33:30.625697 kubelet[2476]: E0412 18:33:30.625636 2476 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:30.625697 kubelet[2476]: E0412 18:33:30.625659 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2cc72342-8a28-4c74-94cd-b514ad57b5f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tkttm" podUID="2cc72342-8a28-4c74-94cd-b514ad57b5f3" Apr 12 18:33:30.634130 env[1341]: time="2024-04-12T18:33:30.634091694Z" level=error msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" failed" error="failed to destroy network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:33:30.634398 kubelet[2476]: E0412 18:33:30.634368 2476 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:30.634469 kubelet[2476]: E0412 18:33:30.634404 2476 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7"} Apr 12 18:33:30.634469 kubelet[2476]: E0412 18:33:30.634434 2476 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"16a4c0dd-7378-4de2-8821-a7e58b25cedd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:33:30.634469 kubelet[2476]: E0412 18:33:30.634459 2476 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"16a4c0dd-7378-4de2-8821-a7e58b25cedd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-6gsmc" podUID="16a4c0dd-7378-4de2-8821-a7e58b25cedd" Apr 12 18:33:35.481595 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount139668573.mount: Deactivated successfully. Apr 12 18:33:35.628618 env[1341]: time="2024-04-12T18:33:35.628572972Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:35.634609 env[1341]: time="2024-04-12T18:33:35.634564713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:35.637794 env[1341]: time="2024-04-12T18:33:35.637765684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:35.641291 env[1341]: time="2024-04-12T18:33:35.641265496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:35.641708 env[1341]: time="2024-04-12T18:33:35.641674938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:33:35.657635 env[1341]: time="2024-04-12T18:33:35.657591754Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:33:35.681184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3898574614.mount: Deactivated successfully. Apr 12 18:33:35.696208 env[1341]: time="2024-04-12T18:33:35.696151210Z" level=info msg="CreateContainer within sandbox \"6624099017fa279962226f1983210177a3c8a6e7713cec07277f597fede1eb21\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b\"" Apr 12 18:33:35.696694 env[1341]: time="2024-04-12T18:33:35.696631812Z" level=info msg="StartContainer for \"35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b\"" Apr 12 18:33:35.719986 systemd[1]: Started cri-containerd-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b.scope. Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.743340 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:33:35.743437 kernel: audit: type=1400 audit(1712946815.737:1151): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2925 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.789090 kernel: audit: type=1300 audit(1712946815.737:1151): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2925 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636131316539303235336561333163333830343736396137653431 Apr 12 18:33:35.814086 kernel: audit: type=1327 audit(1712946815.737:1151): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636131316539303235336561333163333830343736396137653431 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.831961 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.836654 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.867884 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.867996 env[1341]: time="2024-04-12T18:33:35.867857896Z" level=info msg="StartContainer for \"35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b\" returns successfully" Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.888926 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.907977 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.926006 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.944478 kernel: audit: type=1400 audit(1712946815.737:1152): avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit: BPF prog-id=146 op=LOAD Apr 12 18:33:35.737000 audit[3381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2925 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636131316539303235336561333163333830343736396137653431 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit: BPF prog-id=147 op=LOAD Apr 12 18:33:35.737000 audit[3381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2925 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636131316539303235336561333163333830343736396137653431 Apr 12 18:33:35.737000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:33:35.737000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { perfmon } for pid=3381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit[3381]: AVC avc: denied { bpf } for pid=3381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:35.737000 audit: BPF prog-id=148 op=LOAD Apr 12 18:33:35.737000 audit[3381]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2925 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:35.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636131316539303235336561333163333830343736396137653431 Apr 12 18:33:36.259231 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:33:36.259391 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:33:36.600418 kubelet[2476]: I0412 18:33:36.600295 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gfm9m" podStartSLOduration=2.17139107 podStartE2EDuration="17.600255448s" podCreationTimestamp="2024-04-12 18:33:19 +0000 UTC" firstStartedPulling="2024-04-12 18:33:20.213096361 +0000 UTC m=+20.859746387" lastFinishedPulling="2024-04-12 18:33:35.641960699 +0000 UTC m=+36.288610765" observedRunningTime="2024-04-12 18:33:36.598396082 +0000 UTC m=+37.245046148" watchObservedRunningTime="2024-04-12 18:33:36.600255448 +0000 UTC m=+37.246905514" Apr 12 18:33:37.569000 audit[3481]: AVC avc: denied { write } for pid=3481 comm="tee" name="fd" dev="proc" ino=23404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.569000 audit[3481]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcbd9c971 a2=241 a3=1b6 items=1 ppid=3445 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.569000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:33:37.569000 audit: PATH item=0 name="/dev/fd/63" inode=24115 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.569000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.576000 audit[3492]: AVC avc: denied { write } for pid=3492 comm="tee" name="fd" dev="proc" ino=23409 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.576000 audit[3492]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffea9b5971 a2=241 a3=1b6 items=1 ppid=3446 pid=3492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.576000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:33:37.576000 audit: PATH item=0 name="/dev/fd/63" inode=23398 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.576000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.588000 audit[3499]: AVC avc: denied { write } for pid=3499 comm="tee" name="fd" dev="proc" ino=23417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.588000 audit[3499]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee973961 a2=241 a3=1b6 items=1 ppid=3449 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.588000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:33:37.588000 audit: PATH item=0 name="/dev/fd/63" inode=23406 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.588000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.591000 audit[3510]: AVC avc: denied { write } for pid=3510 comm="tee" name="fd" dev="proc" ino=24131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.591000 audit[3510]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd889f972 a2=241 a3=1b6 items=1 ppid=3465 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.591000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:33:37.591000 audit: PATH item=0 name="/dev/fd/63" inode=23421 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.591000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.602000 audit[3516]: AVC avc: denied { write } for pid=3516 comm="tee" name="fd" dev="proc" ino=23427 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.602000 audit[3516]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1930973 a2=241 a3=1b6 items=1 ppid=3458 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.602000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:33:37.602000 audit: PATH item=0 name="/dev/fd/63" inode=24136 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.615000 audit[3520]: AVC avc: denied { write } for pid=3520 comm="tee" name="fd" dev="proc" ino=23432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.615000 audit[3520]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9986962 a2=241 a3=1b6 items=1 ppid=3464 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.615000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:33:37.615000 audit: PATH item=0 name="/dev/fd/63" inode=23429 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.615000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:37.624000 audit[3513]: AVC avc: denied { write } for pid=3513 comm="tee" name="fd" dev="proc" ino=24141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:33:37.624000 audit[3513]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca1f7971 a2=241 a3=1b6 items=1 ppid=3450 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:37.624000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:33:37.624000 audit: PATH item=0 name="/dev/fd/63" inode=24135 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:33:37.624000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:33:42.440830 env[1341]: time="2024-04-12T18:33:42.440781418Z" level=info msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.480 [INFO][3626] k8s.go 585: Cleaning up netns ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.480 [INFO][3626] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" iface="eth0" netns="/var/run/netns/cni-f984d282-69ca-3a1f-b8bb-7586bee2890f" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.481 [INFO][3626] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" iface="eth0" netns="/var/run/netns/cni-f984d282-69ca-3a1f-b8bb-7586bee2890f" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.481 [INFO][3626] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" iface="eth0" netns="/var/run/netns/cni-f984d282-69ca-3a1f-b8bb-7586bee2890f" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.481 [INFO][3626] k8s.go 592: Releasing IP address(es) ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.481 [INFO][3626] utils.go 188: Calico CNI releasing IP address ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.499 [INFO][3632] ipam_plugin.go 415: Releasing address using handleID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.499 [INFO][3632] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.499 [INFO][3632] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.511 [WARNING][3632] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.511 [INFO][3632] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.513 [INFO][3632] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:42.515359 env[1341]: 2024-04-12 18:33:42.514 [INFO][3626] k8s.go 598: Teardown processing complete. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:42.517687 systemd[1]: run-netns-cni\x2df984d282\x2d69ca\x2d3a1f\x2db8bb\x2d7586bee2890f.mount: Deactivated successfully. Apr 12 18:33:42.518286 env[1341]: time="2024-04-12T18:33:42.518246305Z" level=info msg="TearDown network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" successfully" Apr 12 18:33:42.518454 env[1341]: time="2024-04-12T18:33:42.518355785Z" level=info msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" returns successfully" Apr 12 18:33:42.519237 env[1341]: time="2024-04-12T18:33:42.519212028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tkttm,Uid:2cc72342-8a28-4c74-94cd-b514ad57b5f3,Namespace:calico-system,Attempt:1,}" Apr 12 18:33:42.660071 systemd-networkd[1488]: cali5960a4d5b37: Link UP Apr 12 18:33:42.673200 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:33:42.673301 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5960a4d5b37: link becomes ready Apr 12 18:33:42.675595 systemd-networkd[1488]: cali5960a4d5b37: Gained carrier Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.578 [INFO][3638] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.590 [INFO][3638] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0 csi-node-driver- calico-system 2cc72342-8a28-4c74-94cd-b514ad57b5f3 701 0 2024-04-12 18:33:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d csi-node-driver-tkttm eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5960a4d5b37 [] []}} ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.590 [INFO][3638] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.617 [INFO][3653] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" HandleID="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.629 [INFO][3653] ipam_plugin.go 268: Auto assigning IP ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" HandleID="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f75f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"csi-node-driver-tkttm", "timestamp":"2024-04-12 18:33:42.617831743 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.629 [INFO][3653] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.629 [INFO][3653] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.629 [INFO][3653] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.630 [INFO][3653] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.634 [INFO][3653] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.637 [INFO][3653] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.638 [INFO][3653] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.640 [INFO][3653] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.640 [INFO][3653] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.641 [INFO][3653] ipam.go 1682: Creating new handle: k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093 Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.644 [INFO][3653] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.648 [INFO][3653] ipam.go 1216: Successfully claimed IPs: [192.168.13.65/26] block=192.168.13.64/26 handle="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.648 [INFO][3653] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.65/26] handle="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.648 [INFO][3653] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:42.687931 env[1341]: 2024-04-12 18:33:42.648 [INFO][3653] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.65/26] IPv6=[] ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" HandleID="k8s-pod-network.3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.650 [INFO][3638] k8s.go 385: Populated endpoint ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2cc72342-8a28-4c74-94cd-b514ad57b5f3", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"csi-node-driver-tkttm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5960a4d5b37", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.650 [INFO][3638] k8s.go 386: Calico CNI using IPs: [192.168.13.65/32] ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.650 [INFO][3638] dataplane_linux.go 68: Setting the host side veth name to cali5960a4d5b37 ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.675 [INFO][3638] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.677 [INFO][3638] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2cc72342-8a28-4c74-94cd-b514ad57b5f3", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093", Pod:"csi-node-driver-tkttm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5960a4d5b37", MAC:"de:6d:01:d1:a7:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:42.688492 env[1341]: 2024-04-12 18:33:42.686 [INFO][3638] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093" Namespace="calico-system" Pod="csi-node-driver-tkttm" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:42.701887 env[1341]: time="2024-04-12T18:33:42.701736451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:42.701887 env[1341]: time="2024-04-12T18:33:42.701784692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:42.701887 env[1341]: time="2024-04-12T18:33:42.701795012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:42.703009 env[1341]: time="2024-04-12T18:33:42.702944455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093 pid=3680 runtime=io.containerd.runc.v2 Apr 12 18:33:42.720965 systemd[1]: Started cri-containerd-3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093.scope. Apr 12 18:33:42.742876 kernel: kauditd_printk_skb: 68 callbacks suppressed Apr 12 18:33:42.742984 kernel: audit: type=1400 audit(1712946822.736:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.777391 kernel: audit: type=1400 audit(1712946822.736:1165): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.795072 kernel: audit: type=1400 audit(1712946822.736:1166): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.795161 kernel: audit: type=1400 audit(1712946822.736:1167): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.831376 kernel: audit: type=1400 audit(1712946822.736:1168): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.850521 kernel: audit: type=1400 audit(1712946822.736:1169): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.853574 env[1341]: time="2024-04-12T18:33:42.853539737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tkttm,Uid:2cc72342-8a28-4c74-94cd-b514ad57b5f3,Namespace:calico-system,Attempt:1,} returns sandbox id \"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093\"" Apr 12 18:33:42.855352 env[1341]: time="2024-04-12T18:33:42.855320662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:33:42.868850 kernel: audit: type=1400 audit(1712946822.736:1170): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.887482 kernel: audit: type=1400 audit(1712946822.736:1171): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.905852 kernel: audit: type=1400 audit(1712946822.736:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.924166 kernel: audit: type=1400 audit(1712946822.741:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.741000 audit: BPF prog-id=149 op=LOAD Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3680 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303934366164616465393533643038633535316638333563653436 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3680 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303934366164616465393533643038633535316638333563653436 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.758000 audit: BPF prog-id=150 op=LOAD Apr 12 18:33:42.758000 audit[3690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3680 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303934366164616465393533643038633535316638333563653436 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit: BPF prog-id=151 op=LOAD Apr 12 18:33:42.759000 audit[3690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3680 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:42.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303934366164616465393533643038633535316638333563653436 Apr 12 18:33:42.759000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:33:42.759000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { perfmon } for pid=3690 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit[3690]: AVC avc: denied { bpf } for pid=3690 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:42.759000 audit: BPF prog-id=152 op=LOAD Apr 12 18:33:42.759000 audit[3690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3680 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:42.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366303934366164616465393533643038633535316638333563653436 Apr 12 18:33:43.517801 systemd[1]: run-containerd-runc-k8s.io-3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093-runc.cXswO8.mount: Deactivated successfully. Apr 12 18:33:44.252435 env[1341]: time="2024-04-12T18:33:44.252384504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:44.257448 env[1341]: time="2024-04-12T18:33:44.257405440Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:44.260903 env[1341]: time="2024-04-12T18:33:44.260879051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:44.264910 env[1341]: time="2024-04-12T18:33:44.264877903Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:44.265428 env[1341]: time="2024-04-12T18:33:44.265399665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:33:44.269388 env[1341]: time="2024-04-12T18:33:44.269361357Z" level=info msg="CreateContainer within sandbox \"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:33:44.343029 env[1341]: time="2024-04-12T18:33:44.342976386Z" level=info msg="CreateContainer within sandbox \"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"44ee7836cfd408ad30e664277d3cc2c2656bc41c5eb5243399410dbf0a7aeddc\"" Apr 12 18:33:44.343688 env[1341]: time="2024-04-12T18:33:44.343566188Z" level=info msg="StartContainer for \"44ee7836cfd408ad30e664277d3cc2c2656bc41c5eb5243399410dbf0a7aeddc\"" Apr 12 18:33:44.362371 systemd[1]: Started cri-containerd-44ee7836cfd408ad30e664277d3cc2c2656bc41c5eb5243399410dbf0a7aeddc.scope. Apr 12 18:33:44.378000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.378000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3680 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656537383336636664343038616433306536363432373764336363 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit: BPF prog-id=153 op=LOAD Apr 12 18:33:44.379000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3680 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656537383336636664343038616433306536363432373764336363 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.379000 audit: BPF prog-id=154 op=LOAD Apr 12 18:33:44.379000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3680 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656537383336636664343038616433306536363432373764336363 Apr 12 18:33:44.380000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:33:44.380000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { perfmon } for pid=3762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit[3762]: AVC avc: denied { bpf } for pid=3762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.380000 audit: BPF prog-id=155 op=LOAD Apr 12 18:33:44.380000 audit[3762]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3680 pid=3762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434656537383336636664343038616433306536363432373764336363 Apr 12 18:33:44.396429 env[1341]: time="2024-04-12T18:33:44.396384113Z" level=info msg="StartContainer for \"44ee7836cfd408ad30e664277d3cc2c2656bc41c5eb5243399410dbf0a7aeddc\" returns successfully" Apr 12 18:33:44.397945 env[1341]: time="2024-04-12T18:33:44.397920637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:33:44.441135 env[1341]: time="2024-04-12T18:33:44.441098212Z" level=info msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.479 [INFO][3802] k8s.go 585: Cleaning up netns ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.479 [INFO][3802] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" iface="eth0" netns="/var/run/netns/cni-05ce1436-0582-d138-9b22-dbd802531432" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.479 [INFO][3802] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" iface="eth0" netns="/var/run/netns/cni-05ce1436-0582-d138-9b22-dbd802531432" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.480 [INFO][3802] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" iface="eth0" netns="/var/run/netns/cni-05ce1436-0582-d138-9b22-dbd802531432" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.480 [INFO][3802] k8s.go 592: Releasing IP address(es) ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.480 [INFO][3802] utils.go 188: Calico CNI releasing IP address ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.496 [INFO][3809] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.496 [INFO][3809] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.496 [INFO][3809] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.504 [WARNING][3809] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.504 [INFO][3809] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.505 [INFO][3809] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:44.514263 env[1341]: 2024-04-12 18:33:44.512 [INFO][3802] k8s.go 598: Teardown processing complete. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:44.514867 env[1341]: time="2024-04-12T18:33:44.514803801Z" level=info msg="TearDown network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" successfully" Apr 12 18:33:44.514959 env[1341]: time="2024-04-12T18:33:44.514942042Z" level=info msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" returns successfully" Apr 12 18:33:44.515623 env[1341]: time="2024-04-12T18:33:44.515588484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6gsmc,Uid:16a4c0dd-7378-4de2-8821-a7e58b25cedd,Namespace:kube-system,Attempt:1,}" Apr 12 18:33:44.517969 systemd[1]: run-containerd-runc-k8s.io-44ee7836cfd408ad30e664277d3cc2c2656bc41c5eb5243399410dbf0a7aeddc-runc.RKz1KX.mount: Deactivated successfully. Apr 12 18:33:44.518076 systemd[1]: run-netns-cni\x2d05ce1436\x2d0582\x2dd138\x2d9b22\x2ddbd802531432.mount: Deactivated successfully. Apr 12 18:33:44.535017 systemd-networkd[1488]: cali5960a4d5b37: Gained IPv6LL Apr 12 18:33:44.651898 systemd-networkd[1488]: calib3fec898f0a: Link UP Apr 12 18:33:44.666504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:33:44.666583 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib3fec898f0a: link becomes ready Apr 12 18:33:44.667184 systemd-networkd[1488]: calib3fec898f0a: Gained carrier Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.573 [INFO][3815] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.586 [INFO][3815] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0 coredns-76f75df574- kube-system 16a4c0dd-7378-4de2-8821-a7e58b25cedd 714 0 2024-04-12 18:33:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d coredns-76f75df574-6gsmc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib3fec898f0a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.586 [INFO][3815] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.614 [INFO][3829] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" HandleID="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.625 [INFO][3829] ipam_plugin.go 268: Auto assigning IP ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" HandleID="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263430), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"coredns-76f75df574-6gsmc", "timestamp":"2024-04-12 18:33:44.614977593 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.626 [INFO][3829] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.626 [INFO][3829] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.626 [INFO][3829] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.627 [INFO][3829] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.630 [INFO][3829] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.633 [INFO][3829] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.635 [INFO][3829] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.637 [INFO][3829] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.637 [INFO][3829] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.639 [INFO][3829] ipam.go 1682: Creating new handle: k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91 Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.642 [INFO][3829] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.647 [INFO][3829] ipam.go 1216: Successfully claimed IPs: [192.168.13.66/26] block=192.168.13.64/26 handle="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.647 [INFO][3829] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.66/26] handle="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.647 [INFO][3829] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:44.679814 env[1341]: 2024-04-12 18:33:44.647 [INFO][3829] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.66/26] IPv6=[] ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" HandleID="k8s-pod-network.bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.649 [INFO][3815] k8s.go 385: Populated endpoint ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"16a4c0dd-7378-4de2-8821-a7e58b25cedd", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"coredns-76f75df574-6gsmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3fec898f0a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.649 [INFO][3815] k8s.go 386: Calico CNI using IPs: [192.168.13.66/32] ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.649 [INFO][3815] dataplane_linux.go 68: Setting the host side veth name to calib3fec898f0a ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.668 [INFO][3815] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.668 [INFO][3815] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"16a4c0dd-7378-4de2-8821-a7e58b25cedd", ResourceVersion:"714", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91", Pod:"coredns-76f75df574-6gsmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3fec898f0a", MAC:"9e:de:ab:a1:37:7f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:44.680448 env[1341]: 2024-04-12 18:33:44.678 [INFO][3815] k8s.go 498: Wrote updated endpoint to datastore ContainerID="bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91" Namespace="kube-system" Pod="coredns-76f75df574-6gsmc" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:44.697725 env[1341]: time="2024-04-12T18:33:44.697663971Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:44.697914 env[1341]: time="2024-04-12T18:33:44.697883771Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:44.698012 env[1341]: time="2024-04-12T18:33:44.697991172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:44.698299 env[1341]: time="2024-04-12T18:33:44.698261932Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91 pid=3853 runtime=io.containerd.runc.v2 Apr 12 18:33:44.722381 systemd[1]: Started cri-containerd-bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91.scope. Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit: BPF prog-id=156 op=LOAD Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3853 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262653536613536666439386162323636666164336364613638306366 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3853 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262653536613536666439386162323636666164336364613638306366 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit: BPF prog-id=157 op=LOAD Apr 12 18:33:44.734000 audit[3863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3853 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262653536613536666439386162323636666164336364613638306366 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.734000 audit: BPF prog-id=158 op=LOAD Apr 12 18:33:44.734000 audit[3863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3853 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262653536613536666439386162323636666164336364613638306366 Apr 12 18:33:44.735000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:33:44.735000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.735000 audit: BPF prog-id=159 op=LOAD Apr 12 18:33:44.735000 audit[3863]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3853 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262653536613536666439386162323636666164336364613638306366 Apr 12 18:33:44.752935 env[1341]: time="2024-04-12T18:33:44.752899023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-6gsmc,Uid:16a4c0dd-7378-4de2-8821-a7e58b25cedd,Namespace:kube-system,Attempt:1,} returns sandbox id \"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91\"" Apr 12 18:33:44.758084 env[1341]: time="2024-04-12T18:33:44.758049079Z" level=info msg="CreateContainer within sandbox \"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:33:44.790899 env[1341]: time="2024-04-12T18:33:44.789177255Z" level=info msg="CreateContainer within sandbox \"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"77c4fbef531a4fbd396697b05d15285b9044643a9e2268569c86833695f9af2e\"" Apr 12 18:33:44.792924 env[1341]: time="2024-04-12T18:33:44.792795347Z" level=info msg="StartContainer for \"77c4fbef531a4fbd396697b05d15285b9044643a9e2268569c86833695f9af2e\"" Apr 12 18:33:44.806897 systemd[1]: Started cri-containerd-77c4fbef531a4fbd396697b05d15285b9044643a9e2268569c86833695f9af2e.scope. Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.819000 audit: BPF prog-id=160 op=LOAD Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3853 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633466626566353331613466626433393636393762303564313532 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3853 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633466626566353331613466626433393636393762303564313532 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit: BPF prog-id=161 op=LOAD Apr 12 18:33:44.820000 audit[3895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3853 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633466626566353331613466626433393636393762303564313532 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.820000 audit: BPF prog-id=162 op=LOAD Apr 12 18:33:44.820000 audit[3895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3853 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633466626566353331613466626433393636393762303564313532 Apr 12 18:33:44.821000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:33:44.821000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:44.821000 audit: BPF prog-id=163 op=LOAD Apr 12 18:33:44.821000 audit[3895]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3853 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:44.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737633466626566353331613466626433393636393762303564313532 Apr 12 18:33:44.839760 env[1341]: time="2024-04-12T18:33:44.839694693Z" level=info msg="StartContainer for \"77c4fbef531a4fbd396697b05d15285b9044643a9e2268569c86833695f9af2e\" returns successfully" Apr 12 18:33:45.443311 env[1341]: time="2024-04-12T18:33:45.443196834Z" level=info msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" Apr 12 18:33:45.518742 systemd[1]: run-containerd-runc-k8s.io-bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91-runc.0SqVub.mount: Deactivated successfully. Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.510 [INFO][3962] k8s.go 585: Cleaning up netns ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.510 [INFO][3962] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" iface="eth0" netns="/var/run/netns/cni-2c2c7789-0633-ee33-49aa-67cffc93ce4c" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.510 [INFO][3962] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" iface="eth0" netns="/var/run/netns/cni-2c2c7789-0633-ee33-49aa-67cffc93ce4c" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.511 [INFO][3962] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" iface="eth0" netns="/var/run/netns/cni-2c2c7789-0633-ee33-49aa-67cffc93ce4c" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.511 [INFO][3962] k8s.go 592: Releasing IP address(es) ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.511 [INFO][3962] utils.go 188: Calico CNI releasing IP address ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.554 [INFO][3968] ipam_plugin.go 415: Releasing address using handleID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.554 [INFO][3968] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.554 [INFO][3968] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.562 [WARNING][3968] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.562 [INFO][3968] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.564 [INFO][3968] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:45.574526 env[1341]: 2024-04-12 18:33:45.572 [INFO][3962] k8s.go 598: Teardown processing complete. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:45.577897 env[1341]: time="2024-04-12T18:33:45.576778125Z" level=info msg="TearDown network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" successfully" Apr 12 18:33:45.577897 env[1341]: time="2024-04-12T18:33:45.576870925Z" level=info msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" returns successfully" Apr 12 18:33:45.578246 env[1341]: time="2024-04-12T18:33:45.578220890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b88c7fbd9-hzz78,Uid:e8d0da91-a8ae-44dd-a9f1-db1ae63d2230,Namespace:calico-system,Attempt:1,}" Apr 12 18:33:45.578481 systemd[1]: run-netns-cni\x2d2c2c7789\x2d0633\x2dee33\x2d49aa\x2d67cffc93ce4c.mount: Deactivated successfully. Apr 12 18:33:45.616325 kubelet[2476]: I0412 18:33:45.616292 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-6gsmc" podStartSLOduration=31.616254846 podStartE2EDuration="31.616254846s" podCreationTimestamp="2024-04-12 18:33:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:45.616165566 +0000 UTC m=+46.262815632" watchObservedRunningTime="2024-04-12 18:33:45.616254846 +0000 UTC m=+46.262904912" Apr 12 18:33:45.647151 env[1341]: time="2024-04-12T18:33:45.647088821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:45.652000 audit[3978]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=3978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:45.652000 audit[3978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff217f3a0 a2=0 a3=1 items=0 ppid=2663 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:45.660121 env[1341]: time="2024-04-12T18:33:45.660078621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:45.653000 audit[3978]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=3978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:45.653000 audit[3978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff217f3a0 a2=0 a3=1 items=0 ppid=2663 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:45.664186 env[1341]: time="2024-04-12T18:33:45.663265511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:45.668426 env[1341]: time="2024-04-12T18:33:45.668392047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:45.669382 env[1341]: time="2024-04-12T18:33:45.669339690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:33:45.669000 audit[3991]: NETFILTER_CFG table=filter:100 family=2 entries=13 op=nft_register_rule pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:45.669000 audit[3991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff0393af0 a2=0 a3=1 items=0 ppid=2663 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:45.674507 env[1341]: time="2024-04-12T18:33:45.674479145Z" level=info msg="CreateContainer within sandbox \"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:33:45.670000 audit[3991]: NETFILTER_CFG table=nat:101 family=2 entries=33 op=nft_register_chain pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:45.670000 audit[3991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=fffff0393af0 a2=0 a3=1 items=0 ppid=2663 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:45.719577 env[1341]: time="2024-04-12T18:33:45.719464044Z" level=info msg="CreateContainer within sandbox \"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"aa9a64bf6c2caf31e620339763439345f5bda680d9252381bf65df6a97b6c3e9\"" Apr 12 18:33:45.722586 env[1341]: time="2024-04-12T18:33:45.722550453Z" level=info msg="StartContainer for \"aa9a64bf6c2caf31e620339763439345f5bda680d9252381bf65df6a97b6c3e9\"" Apr 12 18:33:45.757026 systemd[1]: Started cri-containerd-aa9a64bf6c2caf31e620339763439345f5bda680d9252381bf65df6a97b6c3e9.scope. Apr 12 18:33:45.778000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.778000 audit[4007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3680 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161396136346266366332636166333165363230333339373633343339 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.779000 audit: BPF prog-id=164 op=LOAD Apr 12 18:33:45.779000 audit[4007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3680 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161396136346266366332636166333165363230333339373633343339 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.780000 audit: BPF prog-id=165 op=LOAD Apr 12 18:33:45.780000 audit[4007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3680 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161396136346266366332636166333165363230333339373633343339 Apr 12 18:33:45.780000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:33:45.781000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { perfmon } for pid=4007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit[4007]: AVC avc: denied { bpf } for pid=4007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.781000 audit: BPF prog-id=166 op=LOAD Apr 12 18:33:45.781000 audit[4007]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3680 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161396136346266366332636166333165363230333339373633343339 Apr 12 18:33:45.799365 systemd-networkd[1488]: caliea721013b84: Link UP Apr 12 18:33:45.814849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:33:45.814941 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea721013b84: link becomes ready Apr 12 18:33:45.819380 systemd-networkd[1488]: caliea721013b84: Gained carrier Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.687 [INFO][3979] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.702 [INFO][3979] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0 calico-kube-controllers-6b88c7fbd9- calico-system e8d0da91-a8ae-44dd-a9f1-db1ae63d2230 724 0 2024-04-12 18:33:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6b88c7fbd9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d calico-kube-controllers-6b88c7fbd9-hzz78 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliea721013b84 [] []}} ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.702 [INFO][3979] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.750 [INFO][3996] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" HandleID="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.771 [INFO][3996] ipam_plugin.go 268: Auto assigning IP ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" HandleID="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f74c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"calico-kube-controllers-6b88c7fbd9-hzz78", "timestamp":"2024-04-12 18:33:45.750416179 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.771 [INFO][3996] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.771 [INFO][3996] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.771 [INFO][3996] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.772 [INFO][3996] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.775 [INFO][3996] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.781 [INFO][3996] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.783 [INFO][3996] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.785 [INFO][3996] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.785 [INFO][3996] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.786 [INFO][3996] ipam.go 1682: Creating new handle: k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0 Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.789 [INFO][3996] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.795 [INFO][3996] ipam.go 1216: Successfully claimed IPs: [192.168.13.67/26] block=192.168.13.64/26 handle="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.795 [INFO][3996] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.67/26] handle="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.795 [INFO][3996] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:45.834370 env[1341]: 2024-04-12 18:33:45.795 [INFO][3996] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.67/26] IPv6=[] ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" HandleID="k8s-pod-network.33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.796 [INFO][3979] k8s.go 385: Populated endpoint ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0", GenerateName:"calico-kube-controllers-6b88c7fbd9-", Namespace:"calico-system", SelfLink:"", UID:"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b88c7fbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"calico-kube-controllers-6b88c7fbd9-hzz78", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea721013b84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.797 [INFO][3979] k8s.go 386: Calico CNI using IPs: [192.168.13.67/32] ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.797 [INFO][3979] dataplane_linux.go 68: Setting the host side veth name to caliea721013b84 ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.816 [INFO][3979] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.821 [INFO][3979] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0", GenerateName:"calico-kube-controllers-6b88c7fbd9-", Namespace:"calico-system", SelfLink:"", UID:"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b88c7fbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0", Pod:"calico-kube-controllers-6b88c7fbd9-hzz78", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea721013b84", MAC:"72:88:08:58:0e:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:45.834979 env[1341]: 2024-04-12 18:33:45.831 [INFO][3979] k8s.go 498: Wrote updated endpoint to datastore ContainerID="33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0" Namespace="calico-system" Pod="calico-kube-controllers-6b88c7fbd9-hzz78" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:45.835799 env[1341]: time="2024-04-12T18:33:45.835749361Z" level=info msg="StartContainer for \"aa9a64bf6c2caf31e620339763439345f5bda680d9252381bf65df6a97b6c3e9\" returns successfully" Apr 12 18:33:45.852374 env[1341]: time="2024-04-12T18:33:45.852321092Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:45.852524 env[1341]: time="2024-04-12T18:33:45.852502013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:45.852625 env[1341]: time="2024-04-12T18:33:45.852604373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:45.852950 env[1341]: time="2024-04-12T18:33:45.852910214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0 pid=4058 runtime=io.containerd.runc.v2 Apr 12 18:33:45.863506 systemd[1]: Started cri-containerd-33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0.scope. Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.876000 audit: BPF prog-id=167 op=LOAD Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313734656462373161373735376463393932373031333362333834 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313734656462373161373735376463393932373031333362333834 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.877000 audit: BPF prog-id=168 op=LOAD Apr 12 18:33:45.877000 audit[4067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313734656462373161373735376463393932373031333362333834 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.878000 audit: BPF prog-id=169 op=LOAD Apr 12 18:33:45.878000 audit[4067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313734656462373161373735376463393932373031333362333834 Apr 12 18:33:45.879000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:33:45.879000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:45.879000 audit: BPF prog-id=170 op=LOAD Apr 12 18:33:45.879000 audit[4067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4058 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:45.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313734656462373161373735376463393932373031333362333834 Apr 12 18:33:45.898863 env[1341]: time="2024-04-12T18:33:45.898808675Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6b88c7fbd9-hzz78,Uid:e8d0da91-a8ae-44dd-a9f1-db1ae63d2230,Namespace:calico-system,Attempt:1,} returns sandbox id \"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0\"" Apr 12 18:33:45.901280 env[1341]: time="2024-04-12T18:33:45.901256003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:33:46.326963 systemd-networkd[1488]: calib3fec898f0a: Gained IPv6LL Apr 12 18:33:46.440914 env[1341]: time="2024-04-12T18:33:46.440829605Z" level=info msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" Apr 12 18:33:46.519416 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1580632670.mount: Deactivated successfully. Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] k8s.go 585: Cleaning up netns ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" iface="eth0" netns="/var/run/netns/cni-bb4ba309-3f2d-a4f6-8227-1aaf55ca5e4c" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" iface="eth0" netns="/var/run/netns/cni-bb4ba309-3f2d-a4f6-8227-1aaf55ca5e4c" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" iface="eth0" netns="/var/run/netns/cni-bb4ba309-3f2d-a4f6-8227-1aaf55ca5e4c" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] k8s.go 592: Releasing IP address(es) ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.483 [INFO][4125] utils.go 188: Calico CNI releasing IP address ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.501 [INFO][4131] ipam_plugin.go 415: Releasing address using handleID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.501 [INFO][4131] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.501 [INFO][4131] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.512 [WARNING][4131] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.512 [INFO][4131] ipam_plugin.go 443: Releasing address using workloadID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.514 [INFO][4131] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:46.522648 env[1341]: 2024-04-12 18:33:46.520 [INFO][4125] k8s.go 598: Teardown processing complete. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:46.525069 systemd[1]: run-netns-cni\x2dbb4ba309\x2d3f2d\x2da4f6\x2d8227\x2d1aaf55ca5e4c.mount: Deactivated successfully. Apr 12 18:33:46.525418 env[1341]: time="2024-04-12T18:33:46.525235341Z" level=info msg="TearDown network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" successfully" Apr 12 18:33:46.525418 env[1341]: time="2024-04-12T18:33:46.525288501Z" level=info msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" returns successfully" Apr 12 18:33:46.526091 env[1341]: time="2024-04-12T18:33:46.526056704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5rp49,Uid:cf892adf-5ceb-4d1f-95b5-789ab1b37df3,Namespace:kube-system,Attempt:1,}" Apr 12 18:33:46.548770 kubelet[2476]: I0412 18:33:46.548741 2476 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:33:46.548770 kubelet[2476]: I0412 18:33:46.548771 2476 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:33:46.627736 kubelet[2476]: I0412 18:33:46.626893 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tkttm" podStartSLOduration=24.810310934 podStartE2EDuration="27.62685473s" podCreationTimestamp="2024-04-12 18:33:19 +0000 UTC" firstStartedPulling="2024-04-12 18:33:42.85473646 +0000 UTC m=+43.501386526" lastFinishedPulling="2024-04-12 18:33:45.671280256 +0000 UTC m=+46.317930322" observedRunningTime="2024-04-12 18:33:46.626596729 +0000 UTC m=+47.273246795" watchObservedRunningTime="2024-04-12 18:33:46.62685473 +0000 UTC m=+47.273504756" Apr 12 18:33:46.688315 systemd-networkd[1488]: cali2cbb8ffaa12: Link UP Apr 12 18:33:46.696995 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2cbb8ffaa12: link becomes ready Apr 12 18:33:46.697191 systemd-networkd[1488]: cali2cbb8ffaa12: Gained carrier Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.598 [INFO][4140] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.619 [INFO][4140] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0 coredns-76f75df574- kube-system cf892adf-5ceb-4d1f-95b5-789ab1b37df3 742 0 2024-04-12 18:33:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d coredns-76f75df574-5rp49 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2cbb8ffaa12 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.620 [INFO][4140] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.647 [INFO][4152] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" HandleID="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.659 [INFO][4152] ipam_plugin.go 268: Auto assigning IP ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" HandleID="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000263800), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"coredns-76f75df574-5rp49", "timestamp":"2024-04-12 18:33:46.647428392 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.659 [INFO][4152] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.659 [INFO][4152] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.659 [INFO][4152] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.661 [INFO][4152] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.667 [INFO][4152] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.672 [INFO][4152] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.673 [INFO][4152] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.675 [INFO][4152] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.675 [INFO][4152] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.676 [INFO][4152] ipam.go 1682: Creating new handle: k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.679 [INFO][4152] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.684 [INFO][4152] ipam.go 1216: Successfully claimed IPs: [192.168.13.68/26] block=192.168.13.64/26 handle="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.684 [INFO][4152] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.68/26] handle="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.684 [INFO][4152] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:46.707654 env[1341]: 2024-04-12 18:33:46.684 [INFO][4152] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.68/26] IPv6=[] ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" HandleID="k8s-pod-network.90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.686 [INFO][4140] k8s.go 385: Populated endpoint ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cf892adf-5ceb-4d1f-95b5-789ab1b37df3", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"coredns-76f75df574-5rp49", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cbb8ffaa12", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.686 [INFO][4140] k8s.go 386: Calico CNI using IPs: [192.168.13.68/32] ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.686 [INFO][4140] dataplane_linux.go 68: Setting the host side veth name to cali2cbb8ffaa12 ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.696 [INFO][4140] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.697 [INFO][4140] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cf892adf-5ceb-4d1f-95b5-789ab1b37df3", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d", Pod:"coredns-76f75df574-5rp49", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cbb8ffaa12", MAC:"76:d1:a6:09:b4:3d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:46.708209 env[1341]: 2024-04-12 18:33:46.706 [INFO][4140] k8s.go 498: Wrote updated endpoint to datastore ContainerID="90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d" Namespace="kube-system" Pod="coredns-76f75df574-5rp49" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:46.725564 env[1341]: time="2024-04-12T18:33:46.725500749Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:46.725704 env[1341]: time="2024-04-12T18:33:46.725572429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:46.725704 env[1341]: time="2024-04-12T18:33:46.725599510Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:46.725892 env[1341]: time="2024-04-12T18:33:46.725814470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d pid=4179 runtime=io.containerd.runc.v2 Apr 12 18:33:46.740130 systemd[1]: Started cri-containerd-90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d.scope. Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.753000 audit: BPF prog-id=171 op=LOAD Apr 12 18:33:46.754000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.754000 audit[4190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4179 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663937366162653435326163393839383464623563653863633330 Apr 12 18:33:46.755000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.755000 audit[4190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4179 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663937366162653435326163393839383464623563653863633330 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit: BPF prog-id=172 op=LOAD Apr 12 18:33:46.756000 audit[4190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4179 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663937366162653435326163393839383464623563653863633330 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.756000 audit: BPF prog-id=173 op=LOAD Apr 12 18:33:46.756000 audit[4190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4179 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663937366162653435326163393839383464623563653863633330 Apr 12 18:33:46.757000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:33:46.757000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { perfmon } for pid=4190 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit[4190]: AVC avc: denied { bpf } for pid=4190 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.757000 audit: BPF prog-id=174 op=LOAD Apr 12 18:33:46.757000 audit[4190]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4179 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930663937366162653435326163393839383464623563653863633330 Apr 12 18:33:46.785025 env[1341]: time="2024-04-12T18:33:46.784975810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5rp49,Uid:cf892adf-5ceb-4d1f-95b5-789ab1b37df3,Namespace:kube-system,Attempt:1,} returns sandbox id \"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d\"" Apr 12 18:33:46.789366 env[1341]: time="2024-04-12T18:33:46.789329263Z" level=info msg="CreateContainer within sandbox \"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:33:46.850408 env[1341]: time="2024-04-12T18:33:46.850353888Z" level=info msg="CreateContainer within sandbox \"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a34ba98123a567bf22ea510c52bbc59a8c557bb768af3902171b2ddde053641\"" Apr 12 18:33:46.851279 env[1341]: time="2024-04-12T18:33:46.851207211Z" level=info msg="StartContainer for \"8a34ba98123a567bf22ea510c52bbc59a8c557bb768af3902171b2ddde053641\"" Apr 12 18:33:46.867448 systemd[1]: Started cri-containerd-8a34ba98123a567bf22ea510c52bbc59a8c557bb768af3902171b2ddde053641.scope. Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.887000 audit: BPF prog-id=175 op=LOAD Apr 12 18:33:46.888000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.888000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4179 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333462613938313233613536376266323265613531306335326262 Apr 12 18:33:46.890000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.890000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4179 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333462613938313233613536376266323265613531306335326262 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit: BPF prog-id=176 op=LOAD Apr 12 18:33:46.891000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4179 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333462613938313233613536376266323265613531306335326262 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.891000 audit: BPF prog-id=177 op=LOAD Apr 12 18:33:46.891000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4179 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333462613938313233613536376266323265613531306335326262 Apr 12 18:33:46.893000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:33:46.893000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { perfmon } for pid=4222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit[4222]: AVC avc: denied { bpf } for pid=4222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:46.893000 audit: BPF prog-id=178 op=LOAD Apr 12 18:33:46.893000 audit[4222]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4179 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:46.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333462613938313233613536376266323265613531306335326262 Apr 12 18:33:46.910812 env[1341]: time="2024-04-12T18:33:46.910734272Z" level=info msg="StartContainer for \"8a34ba98123a567bf22ea510c52bbc59a8c557bb768af3902171b2ddde053641\" returns successfully" Apr 12 18:33:47.159023 systemd-networkd[1488]: caliea721013b84: Gained IPv6LL Apr 12 18:33:47.643250 kubelet[2476]: I0412 18:33:47.643220 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-5rp49" podStartSLOduration=33.643171432 podStartE2EDuration="33.643171432s" podCreationTimestamp="2024-04-12 18:33:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:33:47.629813512 +0000 UTC m=+48.276463578" watchObservedRunningTime="2024-04-12 18:33:47.643171432 +0000 UTC m=+48.289821498" Apr 12 18:33:47.648000 audit[4275]: NETFILTER_CFG table=filter:102 family=2 entries=10 op=nft_register_rule pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:47.648000 audit[4275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd40d9ac0 a2=0 a3=1 items=0 ppid=2663 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:47.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:47.649000 audit[4275]: NETFILTER_CFG table=nat:103 family=2 entries=42 op=nft_register_rule pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:47.649000 audit[4275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffd40d9ac0 a2=0 a3=1 items=0 ppid=2663 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:47.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:47.659000 audit[4277]: NETFILTER_CFG table=filter:104 family=2 entries=10 op=nft_register_rule pid=4277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:47.659000 audit[4277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffec144140 a2=0 a3=1 items=0 ppid=2663 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:47.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:47.666000 audit[4277]: NETFILTER_CFG table=nat:105 family=2 entries=54 op=nft_register_chain pid=4277 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:47.666000 audit[4277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffec144140 a2=0 a3=1 items=0 ppid=2663 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:47.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:48.385052 env[1341]: time="2024-04-12T18:33:48.385012324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:48.394043 env[1341]: time="2024-04-12T18:33:48.394017310Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:48.398215 env[1341]: time="2024-04-12T18:33:48.398192723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:48.402064 env[1341]: time="2024-04-12T18:33:48.402039094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:48.402681 env[1341]: time="2024-04-12T18:33:48.402657416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:33:48.418970 env[1341]: time="2024-04-12T18:33:48.418940504Z" level=info msg="CreateContainer within sandbox \"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:33:48.449333 env[1341]: time="2024-04-12T18:33:48.449253914Z" level=info msg="CreateContainer within sandbox \"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b\"" Apr 12 18:33:48.449975 env[1341]: time="2024-04-12T18:33:48.449948676Z" level=info msg="StartContainer for \"4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b\"" Apr 12 18:33:48.466885 systemd[1]: Started cri-containerd-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b.scope. Apr 12 18:33:48.488590 kernel: kauditd_printk_skb: 442 callbacks suppressed Apr 12 18:33:48.488694 kernel: audit: type=1400 audit(1712946828.482:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.518901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3889843089.mount: Deactivated successfully. Apr 12 18:33:48.523419 kernel: audit: type=1400 audit(1712946828.482:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.541269 kernel: audit: type=1400 audit(1712946828.482:1294): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.558916 kernel: audit: type=1400 audit(1712946828.482:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.577397 kernel: audit: type=1400 audit(1712946828.482:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.600294 systemd-networkd[1488]: cali2cbb8ffaa12: Gained IPv6LL Apr 12 18:33:48.600863 kernel: audit: type=1400 audit(1712946828.482:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.621109 kernel: audit: type=1400 audit(1712946828.482:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.621194 kernel: audit: type=1400 audit(1712946828.482:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.661878 kernel: audit: type=1400 audit(1712946828.482:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.487000 audit: BPF prog-id=179 op=LOAD Apr 12 18:33:48.680911 kernel: audit: type=1400 audit(1712946828.487:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.681989 env[1341]: time="2024-04-12T18:33:48.681479963Z" level=info msg="StartContainer for \"4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b\" returns successfully" Apr 12 18:33:48.505000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4058 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:48.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613162653232323637353432643836303839356437653566306134 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4058 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:48.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613162653232323637353432643836303839356437653566306134 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit: BPF prog-id=180 op=LOAD Apr 12 18:33:48.505000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4058 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:48.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613162653232323637353432643836303839356437653566306134 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit: BPF prog-id=181 op=LOAD Apr 12 18:33:48.505000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4058 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:48.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613162653232323637353432643836303839356437653566306134 Apr 12 18:33:48.505000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:33:48.505000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { perfmon } for pid=4288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit[4288]: AVC avc: denied { bpf } for pid=4288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:48.505000 audit: BPF prog-id=182 op=LOAD Apr 12 18:33:48.505000 audit[4288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4058 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:48.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613162653232323637353432643836303839356437653566306134 Apr 12 18:33:49.697258 kubelet[2476]: I0412 18:33:49.697227 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6b88c7fbd9-hzz78" podStartSLOduration=28.194506892 podStartE2EDuration="30.697187429s" podCreationTimestamp="2024-04-12 18:33:19 +0000 UTC" firstStartedPulling="2024-04-12 18:33:45.900709121 +0000 UTC m=+46.547359187" lastFinishedPulling="2024-04-12 18:33:48.403389658 +0000 UTC m=+49.050039724" observedRunningTime="2024-04-12 18:33:49.695625625 +0000 UTC m=+50.342275691" watchObservedRunningTime="2024-04-12 18:33:49.697187429 +0000 UTC m=+50.343837495" Apr 12 18:33:49.711337 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.rZciff.mount: Deactivated successfully. Apr 12 18:33:49.830824 kubelet[2476]: I0412 18:33:49.830786 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:33:49.863000 audit[4381]: NETFILTER_CFG table=filter:106 family=2 entries=9 op=nft_register_rule pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:49.863000 audit[4381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd46b5cd0 a2=0 a3=1 items=0 ppid=2663 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:49.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:49.864000 audit[4381]: NETFILTER_CFG table=nat:107 family=2 entries=25 op=nft_register_chain pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:49.864000 audit[4381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffd46b5cd0 a2=0 a3=1 items=0 ppid=2663 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:49.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:49.910631 kubelet[2476]: I0412 18:33:49.910567 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:33:49.929989 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.qTVmR0.mount: Deactivated successfully. Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.398000 audit: BPF prog-id=183 op=LOAD Apr 12 18:33:50.398000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd870e58 a2=70 a3=ffffcd870ec8 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.398000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.399000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit: BPF prog-id=184 op=LOAD Apr 12 18:33:50.399000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd870e58 a2=70 a3=4b243c items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.399000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:33:50.399000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.399000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcd870e10 a2=70 a3=ffffcd870e80 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit: BPF prog-id=185 op=LOAD Apr 12 18:33:50.400000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffcd870df8 a2=70 a3=ffffcd870e68 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.400000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.400000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd870ec8 a2=70 a3=0 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.400000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.400000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.400000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd870eb8 a2=70 a3=0 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.400000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.401000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.401000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd870e28 a2=70 a3=0 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.401000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcd870f00 a2=70 a3=279949ef items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd870f00 a2=70 a3=279949ef items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { perfmon } for pid=4467 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit[4467]: AVC avc: denied { bpf } for pid=4467 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.403000 audit: BPF prog-id=186 op=LOAD Apr 12 18:33:50.403000 audit[4467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcd870e28 a2=70 a3=27994a09 items=0 ppid=4425 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:33:50.416000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.416000 audit[4473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc973edf8 a2=70 a3=ffffc973ee68 items=0 ppid=4425 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:33:50.416000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:50.416000 audit[4473]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc973ecc8 a2=70 a3=ffffc973ed38 items=0 ppid=4425 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:33:50.427000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:33:50.564000 audit[4500]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:50.564000 audit[4500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffffce7e50 a2=0 a3=ffff9cb97fa8 items=0 ppid=4425 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.564000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:50.575000 audit[4498]: NETFILTER_CFG table=raw:109 family=2 entries=19 op=nft_register_chain pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:50.575000 audit[4498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffdee44cd0 a2=0 a3=ffffaffeffa8 items=0 ppid=4425 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:50.582000 audit[4499]: NETFILTER_CFG table=nat:110 family=2 entries=15 op=nft_register_chain pid=4499 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:50.582000 audit[4499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff34509c0 a2=0 a3=ffff921fcfa8 items=0 ppid=4425 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:50.608000 audit[4505]: NETFILTER_CFG table=filter:111 family=2 entries=151 op=nft_register_chain pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:50.608000 audit[4505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=86224 a0=3 a1=ffffcf168e40 a2=0 a3=ffffafaaffa8 items=0 ppid=4425 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:50.608000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:51.384143 systemd-networkd[1488]: vxlan.calico: Link UP Apr 12 18:33:51.384149 systemd-networkd[1488]: vxlan.calico: Gained carrier Apr 12 18:33:52.600288 systemd-networkd[1488]: vxlan.calico: Gained IPv6LL Apr 12 18:33:55.767000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.773484 kernel: kauditd_printk_skb: 142 callbacks suppressed Apr 12 18:33:55.773597 kernel: audit: type=1400 audit(1712946835.767:1332): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.767000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400e989e60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.824116 kernel: audit: type=1300 audit(1712946835.767:1332): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400e989e60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.848787 kernel: audit: type=1327 audit(1712946835.767:1332): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.848883 kernel: audit: type=1400 audit(1712946835.769:1333): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.769000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.769000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e989ec0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.899878 kernel: audit: type=1300 audit(1712946835.769:1333): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e989ec0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.769000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.924519 kernel: audit: type=1327 audit(1712946835.769:1333): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.924873 kernel: audit: type=1400 audit(1712946835.770:1334): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.770000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.770000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e255f40 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.975345 kernel: audit: type=1300 audit(1712946835.770:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e255f40 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:56.000118 kernel: audit: type=1327 audit(1712946835.770:1334): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.780000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:56.023221 kernel: audit: type=1400 audit(1712946835.780:1335): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.780000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400ef56b70 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400e989ef0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400ca5efe0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:33:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:33:56.339000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:56.339000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f86660 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:56.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:56.339000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:56.339000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001253540 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:33:56.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:59.466031 env[1341]: time="2024-04-12T18:33:59.465985571Z" level=info msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.500 [WARNING][4576] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"16a4c0dd-7378-4de2-8821-a7e58b25cedd", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91", Pod:"coredns-76f75df574-6gsmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3fec898f0a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.501 [INFO][4576] k8s.go 585: Cleaning up netns ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.501 [INFO][4576] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" iface="eth0" netns="" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.501 [INFO][4576] k8s.go 592: Releasing IP address(es) ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.501 [INFO][4576] utils.go 188: Calico CNI releasing IP address ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.539 [INFO][4583] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.539 [INFO][4583] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.540 [INFO][4583] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.548 [WARNING][4583] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.548 [INFO][4583] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.549 [INFO][4583] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.552129 env[1341]: 2024-04-12 18:33:59.550 [INFO][4576] k8s.go 598: Teardown processing complete. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.552627 env[1341]: time="2024-04-12T18:33:59.552157238Z" level=info msg="TearDown network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" successfully" Apr 12 18:33:59.552627 env[1341]: time="2024-04-12T18:33:59.552187918Z" level=info msg="StopPodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" returns successfully" Apr 12 18:33:59.553150 env[1341]: time="2024-04-12T18:33:59.553121561Z" level=info msg="RemovePodSandbox for \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" Apr 12 18:33:59.553228 env[1341]: time="2024-04-12T18:33:59.553157121Z" level=info msg="Forcibly stopping sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\"" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.587 [WARNING][4601] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"16a4c0dd-7378-4de2-8821-a7e58b25cedd", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"bbe56a56fd98ab266fad3cda680cfbef563bbc30977c6bb2c9d0e92cba15cc91", Pod:"coredns-76f75df574-6gsmc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3fec898f0a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.587 [INFO][4601] k8s.go 585: Cleaning up netns ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.588 [INFO][4601] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" iface="eth0" netns="" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.588 [INFO][4601] k8s.go 592: Releasing IP address(es) ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.588 [INFO][4601] utils.go 188: Calico CNI releasing IP address ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.610 [INFO][4608] ipam_plugin.go 415: Releasing address using handleID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.610 [INFO][4608] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.610 [INFO][4608] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.619 [WARNING][4608] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.619 [INFO][4608] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" HandleID="k8s-pod-network.fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--6gsmc-eth0" Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.620 [INFO][4608] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.625971 env[1341]: 2024-04-12 18:33:59.623 [INFO][4601] k8s.go 598: Teardown processing complete. ContainerID="fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7" Apr 12 18:33:59.626494 env[1341]: time="2024-04-12T18:33:59.626452874Z" level=info msg="TearDown network for sandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" successfully" Apr 12 18:33:59.634949 env[1341]: time="2024-04-12T18:33:59.634915896Z" level=info msg="RemovePodSandbox \"fd266bfd32f3c39382d14b47abb70f80cdc1f62f5799ba784c7cee1cb183c0f7\" returns successfully" Apr 12 18:33:59.644538 env[1341]: time="2024-04-12T18:33:59.638450786Z" level=info msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" Apr 12 18:33:59.643759 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.lIAsYe.mount: Deactivated successfully. Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.688 [WARNING][4640] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0", GenerateName:"calico-kube-controllers-6b88c7fbd9-", Namespace:"calico-system", SelfLink:"", UID:"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b88c7fbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0", Pod:"calico-kube-controllers-6b88c7fbd9-hzz78", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea721013b84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.688 [INFO][4640] k8s.go 585: Cleaning up netns ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.688 [INFO][4640] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" iface="eth0" netns="" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.688 [INFO][4640] k8s.go 592: Releasing IP address(es) ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.688 [INFO][4640] utils.go 188: Calico CNI releasing IP address ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.717 [INFO][4658] ipam_plugin.go 415: Releasing address using handleID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.717 [INFO][4658] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.717 [INFO][4658] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.726 [WARNING][4658] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.726 [INFO][4658] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.727 [INFO][4658] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.730899 env[1341]: 2024-04-12 18:33:59.729 [INFO][4640] k8s.go 598: Teardown processing complete. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.731332 env[1341]: time="2024-04-12T18:33:59.730927390Z" level=info msg="TearDown network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" successfully" Apr 12 18:33:59.731332 env[1341]: time="2024-04-12T18:33:59.730953750Z" level=info msg="StopPodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" returns successfully" Apr 12 18:33:59.731621 env[1341]: time="2024-04-12T18:33:59.731594272Z" level=info msg="RemovePodSandbox for \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" Apr 12 18:33:59.731690 env[1341]: time="2024-04-12T18:33:59.731625152Z" level=info msg="Forcibly stopping sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\"" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.762 [WARNING][4678] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0", GenerateName:"calico-kube-controllers-6b88c7fbd9-", Namespace:"calico-system", SelfLink:"", UID:"e8d0da91-a8ae-44dd-a9f1-db1ae63d2230", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6b88c7fbd9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"33174edb71a7757dc99270133b3844ddcdda455b7be312b6348827486966c9f0", Pod:"calico-kube-controllers-6b88c7fbd9-hzz78", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.13.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliea721013b84", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.762 [INFO][4678] k8s.go 585: Cleaning up netns ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.762 [INFO][4678] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" iface="eth0" netns="" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.762 [INFO][4678] k8s.go 592: Releasing IP address(es) ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.762 [INFO][4678] utils.go 188: Calico CNI releasing IP address ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.786 [INFO][4684] ipam_plugin.go 415: Releasing address using handleID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.786 [INFO][4684] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.786 [INFO][4684] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.794 [WARNING][4684] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.794 [INFO][4684] ipam_plugin.go 443: Releasing address using workloadID ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" HandleID="k8s-pod-network.96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--kube--controllers--6b88c7fbd9--hzz78-eth0" Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.795 [INFO][4684] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.797886 env[1341]: 2024-04-12 18:33:59.796 [INFO][4678] k8s.go 598: Teardown processing complete. ContainerID="96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e" Apr 12 18:33:59.798302 env[1341]: time="2024-04-12T18:33:59.797913847Z" level=info msg="TearDown network for sandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" successfully" Apr 12 18:33:59.805969 env[1341]: time="2024-04-12T18:33:59.805935188Z" level=info msg="RemovePodSandbox \"96c52ca4021ce04a7fa35439c9895ccaa28e5f2bbad5bbcc9707afaa1be9d49e\" returns successfully" Apr 12 18:33:59.806559 env[1341]: time="2024-04-12T18:33:59.806504349Z" level=info msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.838 [WARNING][4704] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2cc72342-8a28-4c74-94cd-b514ad57b5f3", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093", Pod:"csi-node-driver-tkttm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5960a4d5b37", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.838 [INFO][4704] k8s.go 585: Cleaning up netns ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.838 [INFO][4704] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" iface="eth0" netns="" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.838 [INFO][4704] k8s.go 592: Releasing IP address(es) ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.838 [INFO][4704] utils.go 188: Calico CNI releasing IP address ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.855 [INFO][4710] ipam_plugin.go 415: Releasing address using handleID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.856 [INFO][4710] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.856 [INFO][4710] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.864 [WARNING][4710] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.864 [INFO][4710] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.865 [INFO][4710] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.868023 env[1341]: 2024-04-12 18:33:59.866 [INFO][4704] k8s.go 598: Teardown processing complete. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.868450 env[1341]: time="2024-04-12T18:33:59.868058232Z" level=info msg="TearDown network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" successfully" Apr 12 18:33:59.868450 env[1341]: time="2024-04-12T18:33:59.868087952Z" level=info msg="StopPodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" returns successfully" Apr 12 18:33:59.868876 env[1341]: time="2024-04-12T18:33:59.868820754Z" level=info msg="RemovePodSandbox for \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" Apr 12 18:33:59.868944 env[1341]: time="2024-04-12T18:33:59.868883074Z" level=info msg="Forcibly stopping sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\"" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.899 [WARNING][4729] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2cc72342-8a28-4c74-94cd-b514ad57b5f3", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"3f0946adade953d08c551f835ce463dedb19509e8ab6ade0a8f7681b8de6d093", Pod:"csi-node-driver-tkttm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.13.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5960a4d5b37", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.899 [INFO][4729] k8s.go 585: Cleaning up netns ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.899 [INFO][4729] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" iface="eth0" netns="" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.899 [INFO][4729] k8s.go 592: Releasing IP address(es) ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.899 [INFO][4729] utils.go 188: Calico CNI releasing IP address ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.915 [INFO][4735] ipam_plugin.go 415: Releasing address using handleID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.915 [INFO][4735] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.916 [INFO][4735] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.924 [WARNING][4735] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.924 [INFO][4735] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" HandleID="k8s-pod-network.9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-csi--node--driver--tkttm-eth0" Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.925 [INFO][4735] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.927306 env[1341]: 2024-04-12 18:33:59.926 [INFO][4729] k8s.go 598: Teardown processing complete. ContainerID="9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685" Apr 12 18:33:59.927717 env[1341]: time="2024-04-12T18:33:59.927347108Z" level=info msg="TearDown network for sandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" successfully" Apr 12 18:33:59.934652 env[1341]: time="2024-04-12T18:33:59.934618487Z" level=info msg="RemovePodSandbox \"9aa7266c4e81f779a05201e29e438712244463f0df4c424db97b0b384633b685\" returns successfully" Apr 12 18:33:59.935125 env[1341]: time="2024-04-12T18:33:59.935095649Z" level=info msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.967 [WARNING][4753] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cf892adf-5ceb-4d1f-95b5-789ab1b37df3", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d", Pod:"coredns-76f75df574-5rp49", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cbb8ffaa12", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.967 [INFO][4753] k8s.go 585: Cleaning up netns ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.967 [INFO][4753] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" iface="eth0" netns="" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.967 [INFO][4753] k8s.go 592: Releasing IP address(es) ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.967 [INFO][4753] utils.go 188: Calico CNI releasing IP address ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.984 [INFO][4760] ipam_plugin.go 415: Releasing address using handleID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.984 [INFO][4760] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.984 [INFO][4760] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.992 [WARNING][4760] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.992 [INFO][4760] ipam_plugin.go 443: Releasing address using workloadID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.993 [INFO][4760] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:59.995604 env[1341]: 2024-04-12 18:33:59.994 [INFO][4753] k8s.go 598: Teardown processing complete. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:33:59.997031 env[1341]: time="2024-04-12T18:33:59.995582488Z" level=info msg="TearDown network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" successfully" Apr 12 18:33:59.997031 env[1341]: time="2024-04-12T18:33:59.996983932Z" level=info msg="StopPodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" returns successfully" Apr 12 18:33:59.997482 env[1341]: time="2024-04-12T18:33:59.997453293Z" level=info msg="RemovePodSandbox for \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" Apr 12 18:33:59.997554 env[1341]: time="2024-04-12T18:33:59.997485613Z" level=info msg="Forcibly stopping sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\"" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.029 [WARNING][4778] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"cf892adf-5ceb-4d1f-95b5-789ab1b37df3", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"90f976abe452ac98984db5ce8cc30c9272a56c8761af2ef5d585b96056968b7d", Pod:"coredns-76f75df574-5rp49", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.13.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2cbb8ffaa12", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.029 [INFO][4778] k8s.go 585: Cleaning up netns ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.029 [INFO][4778] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" iface="eth0" netns="" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.029 [INFO][4778] k8s.go 592: Releasing IP address(es) ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.029 [INFO][4778] utils.go 188: Calico CNI releasing IP address ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.046 [INFO][4784] ipam_plugin.go 415: Releasing address using handleID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.046 [INFO][4784] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.046 [INFO][4784] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.054 [WARNING][4784] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.054 [INFO][4784] ipam_plugin.go 443: Releasing address using workloadID ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" HandleID="k8s-pod-network.041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-coredns--76f75df574--5rp49-eth0" Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.055 [INFO][4784] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:00.058244 env[1341]: 2024-04-12 18:34:00.056 [INFO][4778] k8s.go 598: Teardown processing complete. ContainerID="041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a" Apr 12 18:34:00.058663 env[1341]: time="2024-04-12T18:34:00.058283612Z" level=info msg="TearDown network for sandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" successfully" Apr 12 18:34:00.065189 env[1341]: time="2024-04-12T18:34:00.065140990Z" level=info msg="RemovePodSandbox \"041d27ea4297dc853594fce94ef3dccef88900f186ca6583bd9481717b7ea26a\" returns successfully" Apr 12 18:34:06.315123 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.71VyDh.mount: Deactivated successfully. Apr 12 18:34:13.356000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.362671 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:34:13.362761 kernel: audit: type=1400 audit(1712946853.356:1340): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.356000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf1c0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.414619 kernel: audit: type=1300 audit(1712946853.356:1340): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf1c0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.356000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.439263 kernel: audit: type=1327 audit(1712946853.356:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.357000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.461399 kernel: audit: type=1400 audit(1712946853.357:1341): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.357000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400224f900 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.492861 kernel: audit: type=1300 audit(1712946853.357:1341): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400224f900 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.517708 kernel: audit: type=1327 audit(1712946853.357:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.357000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.540129 kernel: audit: type=1400 audit(1712946853.357:1342): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.357000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf360 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.569753 kernel: audit: type=1300 audit(1712946853.357:1342): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf360 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.357000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.594396 kernel: audit: type=1327 audit(1712946853.357:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:13.358000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.616620 kernel: audit: type=1400 audit(1712946853.358:1343): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:13.358000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf6e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:13.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:19.927441 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.ATQB1E.mount: Deactivated successfully. Apr 12 18:34:24.363292 kubelet[2476]: I0412 18:34:24.363239 2476 topology_manager.go:215] "Topology Admit Handler" podUID="8fcb39d2-d3c5-4afd-b81b-23b3550a12df" podNamespace="calico-apiserver" podName="calico-apiserver-5ddbb59578-cbh2z" Apr 12 18:34:24.368585 systemd[1]: Created slice kubepods-besteffort-pod8fcb39d2_d3c5_4afd_b81b_23b3550a12df.slice. Apr 12 18:34:24.402964 kubelet[2476]: I0412 18:34:24.402923 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfcnq\" (UniqueName: \"kubernetes.io/projected/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-kube-api-access-sfcnq\") pod \"calico-apiserver-5ddbb59578-cbh2z\" (UID: \"8fcb39d2-d3c5-4afd-b81b-23b3550a12df\") " pod="calico-apiserver/calico-apiserver-5ddbb59578-cbh2z" Apr 12 18:34:24.403141 kubelet[2476]: I0412 18:34:24.402976 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-calico-apiserver-certs\") pod \"calico-apiserver-5ddbb59578-cbh2z\" (UID: \"8fcb39d2-d3c5-4afd-b81b-23b3550a12df\") " pod="calico-apiserver/calico-apiserver-5ddbb59578-cbh2z" Apr 12 18:34:24.421787 kubelet[2476]: I0412 18:34:24.421737 2476 topology_manager.go:215] "Topology Admit Handler" podUID="cb80727d-d1b1-4a2f-8c74-df7907b0c144" podNamespace="calico-apiserver" podName="calico-apiserver-5ddbb59578-4r6s5" Apr 12 18:34:24.426409 systemd[1]: Created slice kubepods-besteffort-podcb80727d_d1b1_4a2f_8c74_df7907b0c144.slice. Apr 12 18:34:24.452000 audit[4866]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.459429 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:34:24.459534 kernel: audit: type=1325 audit(1712946864.452:1344): table=filter:112 family=2 entries=8 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.452000 audit[4866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe034d20 a2=0 a3=1 items=0 ppid=2663 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.502861 kernel: audit: type=1300 audit(1712946864.452:1344): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffe034d20 a2=0 a3=1 items=0 ppid=2663 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.503261 kubelet[2476]: I0412 18:34:24.503236 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x7c2r\" (UniqueName: \"kubernetes.io/projected/cb80727d-d1b1-4a2f-8c74-df7907b0c144-kube-api-access-x7c2r\") pod \"calico-apiserver-5ddbb59578-4r6s5\" (UID: \"cb80727d-d1b1-4a2f-8c74-df7907b0c144\") " pod="calico-apiserver/calico-apiserver-5ddbb59578-4r6s5" Apr 12 18:34:24.503459 kubelet[2476]: I0412 18:34:24.503434 2476 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cb80727d-d1b1-4a2f-8c74-df7907b0c144-calico-apiserver-certs\") pod \"calico-apiserver-5ddbb59578-4r6s5\" (UID: \"cb80727d-d1b1-4a2f-8c74-df7907b0c144\") " pod="calico-apiserver/calico-apiserver-5ddbb59578-4r6s5" Apr 12 18:34:24.503969 kubelet[2476]: E0412 18:34:24.503951 2476 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:34:24.504129 kubelet[2476]: E0412 18:34:24.504116 2476 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-calico-apiserver-certs podName:8fcb39d2-d3c5-4afd-b81b-23b3550a12df nodeName:}" failed. No retries permitted until 2024-04-12 18:34:25.00409703 +0000 UTC m=+85.650747096 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-calico-apiserver-certs") pod "calico-apiserver-5ddbb59578-cbh2z" (UID: "8fcb39d2-d3c5-4afd-b81b-23b3550a12df") : secret "calico-apiserver-certs" not found Apr 12 18:34:24.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.523867 kernel: audit: type=1327 audit(1712946864.452:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.474000 audit[4866]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.542635 kernel: audit: type=1325 audit(1712946864.474:1345): table=nat:113 family=2 entries=20 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.474000 audit[4866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffe034d20 a2=0 a3=1 items=0 ppid=2663 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.569820 kernel: audit: type=1300 audit(1712946864.474:1345): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffe034d20 a2=0 a3=1 items=0 ppid=2663 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.584124 kernel: audit: type=1327 audit(1712946864.474:1345): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.582000 audit[4869]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.582000 audit[4869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffeb306b0 a2=0 a3=1 items=0 ppid=2663 pid=4869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.604670 kubelet[2476]: E0412 18:34:24.604634 2476 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:34:24.605194 kubelet[2476]: E0412 18:34:24.605175 2476 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cb80727d-d1b1-4a2f-8c74-df7907b0c144-calico-apiserver-certs podName:cb80727d-d1b1-4a2f-8c74-df7907b0c144 nodeName:}" failed. No retries permitted until 2024-04-12 18:34:25.105155293 +0000 UTC m=+85.751805359 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/cb80727d-d1b1-4a2f-8c74-df7907b0c144-calico-apiserver-certs") pod "calico-apiserver-5ddbb59578-4r6s5" (UID: "cb80727d-d1b1-4a2f-8c74-df7907b0c144") : secret "calico-apiserver-certs" not found Apr 12 18:34:24.627314 kernel: audit: type=1325 audit(1712946864.582:1346): table=filter:114 family=2 entries=9 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.627416 kernel: audit: type=1300 audit(1712946864.582:1346): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffeb306b0 a2=0 a3=1 items=0 ppid=2663 pid=4869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.643881 kernel: audit: type=1327 audit(1712946864.582:1346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.591000 audit[4869]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:24.591000 audit[4869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffeb306b0 a2=0 a3=1 items=0 ppid=2663 pid=4869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:24.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:24.659864 kernel: audit: type=1325 audit(1712946864.591:1347): table=nat:115 family=2 entries=20 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:25.007928 kubelet[2476]: E0412 18:34:25.007888 2476 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:34:25.040494 kubelet[2476]: E0412 18:34:25.008980 2476 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-calico-apiserver-certs podName:8fcb39d2-d3c5-4afd-b81b-23b3550a12df nodeName:}" failed. No retries permitted until 2024-04-12 18:34:26.008956867 +0000 UTC m=+86.655606933 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/8fcb39d2-d3c5-4afd-b81b-23b3550a12df-calico-apiserver-certs") pod "calico-apiserver-5ddbb59578-cbh2z" (UID: "8fcb39d2-d3c5-4afd-b81b-23b3550a12df") : secret "calico-apiserver-certs" not found Apr 12 18:34:25.330172 env[1341]: time="2024-04-12T18:34:25.329609013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ddbb59578-4r6s5,Uid:cb80727d-d1b1-4a2f-8c74-df7907b0c144,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:34:25.490093 systemd-networkd[1488]: calibf4617535aa: Link UP Apr 12 18:34:25.507369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:34:25.507481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibf4617535aa: link becomes ready Apr 12 18:34:25.507871 systemd-networkd[1488]: calibf4617535aa: Gained carrier Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.402 [INFO][4873] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0 calico-apiserver-5ddbb59578- calico-apiserver cb80727d-d1b1-4a2f-8c74-df7907b0c144 900 0 2024-04-12 18:34:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5ddbb59578 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d calico-apiserver-5ddbb59578-4r6s5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibf4617535aa [] []}} ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.402 [INFO][4873] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.448 [INFO][4884] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" HandleID="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.460 [INFO][4884] ipam_plugin.go 268: Auto assigning IP ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" HandleID="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40006076d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"calico-apiserver-5ddbb59578-4r6s5", "timestamp":"2024-04-12 18:34:25.448197354 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.460 [INFO][4884] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.460 [INFO][4884] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.460 [INFO][4884] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.462 [INFO][4884] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.466 [INFO][4884] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.470 [INFO][4884] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.472 [INFO][4884] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.475 [INFO][4884] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.475 [INFO][4884] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.476 [INFO][4884] ipam.go 1682: Creating new handle: k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196 Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.479 [INFO][4884] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.484 [INFO][4884] ipam.go 1216: Successfully claimed IPs: [192.168.13.69/26] block=192.168.13.64/26 handle="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.484 [INFO][4884] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.69/26] handle="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.484 [INFO][4884] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:25.520414 env[1341]: 2024-04-12 18:34:25.484 [INFO][4884] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.69/26] IPv6=[] ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" HandleID="k8s-pod-network.6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.485 [INFO][4873] k8s.go 385: Populated endpoint ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0", GenerateName:"calico-apiserver-5ddbb59578-", Namespace:"calico-apiserver", SelfLink:"", UID:"cb80727d-d1b1-4a2f-8c74-df7907b0c144", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ddbb59578", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"calico-apiserver-5ddbb59578-4r6s5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf4617535aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.486 [INFO][4873] k8s.go 386: Calico CNI using IPs: [192.168.13.69/32] ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.486 [INFO][4873] dataplane_linux.go 68: Setting the host side veth name to calibf4617535aa ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.507 [INFO][4873] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.507 [INFO][4873] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0", GenerateName:"calico-apiserver-5ddbb59578-", Namespace:"calico-apiserver", SelfLink:"", UID:"cb80727d-d1b1-4a2f-8c74-df7907b0c144", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ddbb59578", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196", Pod:"calico-apiserver-5ddbb59578-4r6s5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf4617535aa", MAC:"76:ff:af:45:63:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:25.521037 env[1341]: 2024-04-12 18:34:25.519 [INFO][4873] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-4r6s5" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--4r6s5-eth0" Apr 12 18:34:25.536858 env[1341]: time="2024-04-12T18:34:25.536783429Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:25.537049 env[1341]: time="2024-04-12T18:34:25.537024670Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:25.537134 env[1341]: time="2024-04-12T18:34:25.537114910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:25.537331 env[1341]: time="2024-04-12T18:34:25.537304630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196 pid=4916 runtime=io.containerd.runc.v2 Apr 12 18:34:25.565790 systemd[1]: run-containerd-runc-k8s.io-6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196-runc.yWb97A.mount: Deactivated successfully. Apr 12 18:34:25.572602 systemd[1]: Started cri-containerd-6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196.scope. Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.587000 audit: BPF prog-id=187 op=LOAD Apr 12 18:34:25.587000 audit[4944]: NETFILTER_CFG table=filter:116 family=2 entries=65 op=nft_register_chain pid=4944 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:25.587000 audit[4944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32992 a0=3 a1=fffffa6bbe20 a2=0 a3=ffff9c4edfa8 items=0 ppid=4425 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.587000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4916 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383035633032653662643563306536383363383636613132316334 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4916 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383035633032653662643563306536383363383636613132316334 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit: BPF prog-id=188 op=LOAD Apr 12 18:34:25.589000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4916 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383035633032653662643563306536383363383636613132316334 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit: BPF prog-id=189 op=LOAD Apr 12 18:34:25.589000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4916 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383035633032653662643563306536383363383636613132316334 Apr 12 18:34:25.589000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:34:25.589000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:25.589000 audit: BPF prog-id=190 op=LOAD Apr 12 18:34:25.589000 audit[4928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4916 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:25.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665383035633032653662643563306536383363383636613132316334 Apr 12 18:34:25.616790 env[1341]: time="2024-04-12T18:34:25.616735165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ddbb59578-4r6s5,Uid:cb80727d-d1b1-4a2f-8c74-df7907b0c144,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196\"" Apr 12 18:34:25.621090 env[1341]: time="2024-04-12T18:34:25.621054815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:34:26.173371 env[1341]: time="2024-04-12T18:34:26.173323789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ddbb59578-cbh2z,Uid:8fcb39d2-d3c5-4afd-b81b-23b3550a12df,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:34:26.328955 systemd-networkd[1488]: cali6c93b4070bb: Link UP Apr 12 18:34:26.338928 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6c93b4070bb: link becomes ready Apr 12 18:34:26.339221 systemd-networkd[1488]: cali6c93b4070bb: Gained carrier Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.250 [INFO][4953] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0 calico-apiserver-5ddbb59578- calico-apiserver 8fcb39d2-d3c5-4afd-b81b-23b3550a12df 894 0 2024-04-12 18:34:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5ddbb59578 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.3-a-acc6b8d17d calico-apiserver-5ddbb59578-cbh2z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6c93b4070bb [] []}} ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.250 [INFO][4953] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.286 [INFO][4963] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" HandleID="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.297 [INFO][4963] ipam_plugin.go 268: Auto assigning IP ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" HandleID="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ef590), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.3-a-acc6b8d17d", "pod":"calico-apiserver-5ddbb59578-cbh2z", "timestamp":"2024-04-12 18:34:26.286543877 +0000 UTC"}, Hostname:"ci-3510.3.3-a-acc6b8d17d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.297 [INFO][4963] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.297 [INFO][4963] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.297 [INFO][4963] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.3-a-acc6b8d17d' Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.299 [INFO][4963] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.302 [INFO][4963] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.305 [INFO][4963] ipam.go 489: Trying affinity for 192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.307 [INFO][4963] ipam.go 155: Attempting to load block cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.309 [INFO][4963] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.13.64/26 host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.309 [INFO][4963] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.13.64/26 handle="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.310 [INFO][4963] ipam.go 1682: Creating new handle: k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360 Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.313 [INFO][4963] ipam.go 1203: Writing block in order to claim IPs block=192.168.13.64/26 handle="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.320 [INFO][4963] ipam.go 1216: Successfully claimed IPs: [192.168.13.70/26] block=192.168.13.64/26 handle="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.320 [INFO][4963] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.13.70/26] handle="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" host="ci-3510.3.3-a-acc6b8d17d" Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.320 [INFO][4963] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:34:26.351929 env[1341]: 2024-04-12 18:34:26.320 [INFO][4963] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.13.70/26] IPv6=[] ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" HandleID="k8s-pod-network.2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Workload="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.324 [INFO][4953] k8s.go 385: Populated endpoint ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0", GenerateName:"calico-apiserver-5ddbb59578-", Namespace:"calico-apiserver", SelfLink:"", UID:"8fcb39d2-d3c5-4afd-b81b-23b3550a12df", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ddbb59578", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"", Pod:"calico-apiserver-5ddbb59578-cbh2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6c93b4070bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.324 [INFO][4953] k8s.go 386: Calico CNI using IPs: [192.168.13.70/32] ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.324 [INFO][4953] dataplane_linux.go 68: Setting the host side veth name to cali6c93b4070bb ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.339 [INFO][4953] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.341 [INFO][4953] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0", GenerateName:"calico-apiserver-5ddbb59578-", Namespace:"calico-apiserver", SelfLink:"", UID:"8fcb39d2-d3c5-4afd-b81b-23b3550a12df", ResourceVersion:"894", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 34, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5ddbb59578", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.3-a-acc6b8d17d", ContainerID:"2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360", Pod:"calico-apiserver-5ddbb59578-cbh2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.13.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6c93b4070bb", MAC:"3e:11:16:b5:8e:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:34:26.353529 env[1341]: 2024-04-12 18:34:26.350 [INFO][4953] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360" Namespace="calico-apiserver" Pod="calico-apiserver-5ddbb59578-cbh2z" WorkloadEndpoint="ci--3510.3.3--a--acc6b8d17d-k8s-calico--apiserver--5ddbb59578--cbh2z-eth0" Apr 12 18:34:26.367000 audit[4982]: NETFILTER_CFG table=filter:117 family=2 entries=46 op=nft_register_chain pid=4982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:34:26.367000 audit[4982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23876 a0=3 a1=fffff79f8c30 a2=0 a3=ffffbb402fa8 items=0 ppid=4425 pid=4982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.367000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:34:26.375228 env[1341]: time="2024-04-12T18:34:26.374958711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:34:26.375228 env[1341]: time="2024-04-12T18:34:26.375005911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:34:26.375228 env[1341]: time="2024-04-12T18:34:26.375016151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:34:26.375506 env[1341]: time="2024-04-12T18:34:26.375465712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360 pid=4991 runtime=io.containerd.runc.v2 Apr 12 18:34:26.389152 systemd[1]: Started cri-containerd-2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360.scope. Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.403000 audit: BPF prog-id=191 op=LOAD Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4991 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303064356531313664656333626164343938636337666565623439 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4991 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303064356531313664656333626164343938636337666565623439 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit: BPF prog-id=192 op=LOAD Apr 12 18:34:26.404000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4991 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303064356531313664656333626164343938636337666565623439 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit: BPF prog-id=193 op=LOAD Apr 12 18:34:26.404000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4991 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303064356531313664656333626164343938636337666565623439 Apr 12 18:34:26.404000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:34:26.404000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { perfmon } for pid=5001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit[5001]: AVC avc: denied { bpf } for pid=5001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:26.404000 audit: BPF prog-id=194 op=LOAD Apr 12 18:34:26.404000 audit[5001]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4991 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303064356531313664656333626164343938636337666565623439 Apr 12 18:34:26.440109 env[1341]: time="2024-04-12T18:34:26.439996054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5ddbb59578-cbh2z,Uid:8fcb39d2-d3c5-4afd-b81b-23b3550a12df,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360\"" Apr 12 18:34:26.893766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1259127249.mount: Deactivated successfully. Apr 12 18:34:27.352041 systemd-networkd[1488]: calibf4617535aa: Gained IPv6LL Apr 12 18:34:27.812809 env[1341]: time="2024-04-12T18:34:27.812755494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:27.818758 env[1341]: time="2024-04-12T18:34:27.818722987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:27.822881 env[1341]: time="2024-04-12T18:34:27.822853236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:27.826973 env[1341]: time="2024-04-12T18:34:27.826946405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:27.827447 env[1341]: time="2024-04-12T18:34:27.827415326Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:34:27.829129 env[1341]: time="2024-04-12T18:34:27.829098370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:34:27.829881 env[1341]: time="2024-04-12T18:34:27.829824451Z" level=info msg="CreateContainer within sandbox \"6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:34:27.856834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1337950594.mount: Deactivated successfully. Apr 12 18:34:27.865042 env[1341]: time="2024-04-12T18:34:27.865002088Z" level=info msg="CreateContainer within sandbox \"6e805c02e6bd5c0e683c866a121c44da7d0ceea44567079094aab596d8863196\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647\"" Apr 12 18:34:27.865960 env[1341]: time="2024-04-12T18:34:27.865926530Z" level=info msg="StartContainer for \"4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647\"" Apr 12 18:34:27.894174 systemd[1]: Started cri-containerd-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647.scope. Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit: BPF prog-id=195 op=LOAD Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4916 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373538376535653239326534663033306537623033336537613232 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4916 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373538376535653239326534663033306537623033336537613232 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit: BPF prog-id=196 op=LOAD Apr 12 18:34:27.906000 audit[5029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4916 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373538376535653239326534663033306537623033336537613232 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.906000 audit: BPF prog-id=197 op=LOAD Apr 12 18:34:27.906000 audit[5029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4916 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373538376535653239326534663033306537623033336537613232 Apr 12 18:34:27.906000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:34:27.907000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { perfmon } for pid=5029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit[5029]: AVC avc: denied { bpf } for pid=5029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:27.907000 audit: BPF prog-id=198 op=LOAD Apr 12 18:34:27.907000 audit[5029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4916 pid=5029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:27.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463373538376535653239326534663033306537623033336537613232 Apr 12 18:34:27.933691 env[1341]: time="2024-04-12T18:34:27.933638198Z" level=info msg="StartContainer for \"4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647\" returns successfully" Apr 12 18:34:27.992095 systemd-networkd[1488]: cali6c93b4070bb: Gained IPv6LL Apr 12 18:34:28.149294 env[1341]: time="2024-04-12T18:34:28.149188746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:28.155807 env[1341]: time="2024-04-12T18:34:28.155762761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:28.159923 env[1341]: time="2024-04-12T18:34:28.159886810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:28.163340 env[1341]: time="2024-04-12T18:34:28.163313377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:34:28.163693 env[1341]: time="2024-04-12T18:34:28.163669458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:34:28.166175 env[1341]: time="2024-04-12T18:34:28.166148183Z" level=info msg="CreateContainer within sandbox \"2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:34:28.199419 env[1341]: time="2024-04-12T18:34:28.199378375Z" level=info msg="CreateContainer within sandbox \"2700d5e116dec3bad498cc7feeb49be5a035f42a2633dd4db87f1b5ef1db3360\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e\"" Apr 12 18:34:28.200381 env[1341]: time="2024-04-12T18:34:28.200340977Z" level=info msg="StartContainer for \"ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e\"" Apr 12 18:34:28.216571 systemd[1]: Started cri-containerd-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e.scope. Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.246000 audit: BPF prog-id=199 op=LOAD Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4991 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393032376233393766383731343432636639353135643765633638 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4991 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393032376233393766383731343432636639353135643765633638 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.247000 audit: BPF prog-id=200 op=LOAD Apr 12 18:34:28.247000 audit[5065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4991 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393032376233393766383731343432636639353135643765633638 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit: BPF prog-id=201 op=LOAD Apr 12 18:34:28.248000 audit[5065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4991 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393032376233393766383731343432636639353135643765633638 Apr 12 18:34:28.248000 audit: BPF prog-id=201 op=UNLOAD Apr 12 18:34:28.248000 audit: BPF prog-id=200 op=UNLOAD Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:34:28.248000 audit: BPF prog-id=202 op=LOAD Apr 12 18:34:28.248000 audit[5065]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4991 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393032376233393766383731343432636639353135643765633638 Apr 12 18:34:28.277360 env[1341]: time="2024-04-12T18:34:28.277309785Z" level=info msg="StartContainer for \"ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e\" returns successfully" Apr 12 18:34:28.805140 kubelet[2476]: I0412 18:34:28.805090 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5ddbb59578-cbh2z" podStartSLOduration=3.085213575 podStartE2EDuration="4.80504613s" podCreationTimestamp="2024-04-12 18:34:24 +0000 UTC" firstStartedPulling="2024-04-12 18:34:26.444154023 +0000 UTC m=+87.090804089" lastFinishedPulling="2024-04-12 18:34:28.163986578 +0000 UTC m=+88.810636644" observedRunningTime="2024-04-12 18:34:28.804054328 +0000 UTC m=+89.450704394" watchObservedRunningTime="2024-04-12 18:34:28.80504613 +0000 UTC m=+89.451696196" Apr 12 18:34:28.805521 kubelet[2476]: I0412 18:34:28.805177 2476 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5ddbb59578-4r6s5" podStartSLOduration=2.596822096 podStartE2EDuration="4.805158571s" podCreationTimestamp="2024-04-12 18:34:24 +0000 UTC" firstStartedPulling="2024-04-12 18:34:25.619774252 +0000 UTC m=+86.266424278" lastFinishedPulling="2024-04-12 18:34:27.828110727 +0000 UTC m=+88.474760753" observedRunningTime="2024-04-12 18:34:28.782230321 +0000 UTC m=+89.428880387" watchObservedRunningTime="2024-04-12 18:34:28.805158571 +0000 UTC m=+89.451808637" Apr 12 18:34:28.822000 audit[5099]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:28.822000 audit[5099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc37e0ae0 a2=0 a3=1 items=0 ppid=2663 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:28.826000 audit[5099]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:28.826000 audit[5099]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc37e0ae0 a2=0 a3=1 items=0 ppid=2663 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:28.841000 audit[5101]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:28.841000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdab3a5a0 a2=0 a3=1 items=0 ppid=2663 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:28.842000 audit[5101]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:28.851817 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.iFLWsr.mount: Deactivated successfully. Apr 12 18:34:28.842000 audit[5101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdab3a5a0 a2=0 a3=1 items=0 ppid=2663 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:28.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:29.221000 audit[5040]: AVC avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:34:29.221000 audit[5040]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b66e60 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:34:29.221000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:29.461000 audit[5076]: AVC avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:34:29.468962 kernel: kauditd_printk_skb: 251 callbacks suppressed Apr 12 18:34:29.469086 kernel: audit: type=1400 audit(1712946869.461:1427): avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:34:29.461000 audit[5076]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001071740 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:34:29.522944 kernel: audit: type=1300 audit(1712946869.461:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001071740 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:34:29.461000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:29.548341 kernel: audit: type=1327 audit(1712946869.461:1427): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:34:29.641653 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.Q6cINl.mount: Deactivated successfully. Apr 12 18:34:49.928808 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.dcoeHK.mount: Deactivated successfully. Apr 12 18:34:55.348049 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.g1Hmrh.mount: Deactivated successfully. Apr 12 18:34:55.414000 audit[5194]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:55.414000 audit[5194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcdb36e00 a2=0 a3=1 items=0 ppid=2663 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:55.457384 kernel: audit: type=1325 audit(1712946895.414:1428): table=filter:122 family=2 entries=9 op=nft_register_rule pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:55.457484 kernel: audit: type=1300 audit(1712946895.414:1428): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcdb36e00 a2=0 a3=1 items=0 ppid=2663 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:55.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:55.471224 kernel: audit: type=1327 audit(1712946895.414:1428): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:55.471667 kernel: audit: type=1325 audit(1712946895.415:1429): table=nat:123 family=2 entries=27 op=nft_register_chain pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:55.415000 audit[5194]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=5194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:55.415000 audit[5194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcdb36e00 a2=0 a3=1 items=0 ppid=2663 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:55.514591 kernel: audit: type=1300 audit(1712946895.415:1429): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcdb36e00 a2=0 a3=1 items=0 ppid=2663 pid=5194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:55.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:55.528728 kernel: audit: type=1327 audit(1712946895.415:1429): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:55.771000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.771000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009696e40 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.826580 kernel: audit: type=1400 audit(1712946895.771:1430): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.826693 kernel: audit: type=1300 audit(1712946895.771:1430): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009696e40 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.851687 kernel: audit: type=1327 audit(1712946895.771:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.771000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.875006 kernel: audit: type=1400 audit(1712946895.771:1431): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.771000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009621e00 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.771000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.771000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009c0a2a0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.771000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.780000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.780000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009696ea0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009c0a2e0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40095b80f0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:34:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:34:56.232000 audit[5216]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:56.232000 audit[5216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe67a6ce0 a2=0 a3=1 items=0 ppid=2663 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:56.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:56.234000 audit[5216]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=5216 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:34:56.234000 audit[5216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffe67a6ce0 a2=0 a3=1 items=0 ppid=2663 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:34:56.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:34:56.343195 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.IxLBoB.mount: Deactivated successfully. Apr 12 18:34:56.342000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:56.342000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000787ec0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:56.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:56.342000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:34:56.342000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001c3d120 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:34:56.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:34:59.643115 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.Gaufks.mount: Deactivated successfully. Apr 12 18:35:02.042048 update_engine[1331]: I0412 18:35:02.041913 1331 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 18:35:02.042048 update_engine[1331]: I0412 18:35:02.041946 1331 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 18:35:02.042706 update_engine[1331]: I0412 18:35:02.042686 1331 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 18:35:02.043288 update_engine[1331]: I0412 18:35:02.043269 1331 omaha_request_params.cc:62] Current group set to lts Apr 12 18:35:02.043377 update_engine[1331]: I0412 18:35:02.043361 1331 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 18:35:02.043377 update_engine[1331]: I0412 18:35:02.043371 1331 update_attempter.cc:643] Scheduling an action processor start. Apr 12 18:35:02.043432 update_engine[1331]: I0412 18:35:02.043387 1331 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:35:02.043432 update_engine[1331]: I0412 18:35:02.043411 1331 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 18:35:02.043919 update_engine[1331]: I0412 18:35:02.043892 1331 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:35:02.043955 update_engine[1331]: I0412 18:35:02.043915 1331 omaha_request_action.cc:271] Request: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: Apr 12 18:35:02.043955 update_engine[1331]: I0412 18:35:02.043927 1331 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:02.044779 update_engine[1331]: I0412 18:35:02.044759 1331 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:02.045373 update_engine[1331]: I0412 18:35:02.045354 1331 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:02.045721 locksmithd[1418]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:02.090686 update_engine[1331]: E0412 18:35:02.090658 1331 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:02.090781 update_engine[1331]: I0412 18:35:02.090768 1331 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 18:35:06.318019 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.JQbXbi.mount: Deactivated successfully. Apr 12 18:35:12.027504 update_engine[1331]: I0412 18:35:12.027448 1331 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:12.027903 update_engine[1331]: I0412 18:35:12.027683 1331 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:12.027903 update_engine[1331]: I0412 18:35:12.027897 1331 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:12.037202 update_engine[1331]: E0412 18:35:12.037173 1331 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:12.037291 update_engine[1331]: I0412 18:35:12.037261 1331 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 18:35:13.365567 kernel: kauditd_printk_skb: 26 callbacks suppressed Apr 12 18:35:13.365703 kernel: audit: type=1400 audit(1712946913.358:1440): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.358000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.358000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013213e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.414795 kernel: audit: type=1300 audit(1712946913.358:1440): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013213e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.358000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.439143 kernel: audit: type=1327 audit(1712946913.358:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.439233 kernel: audit: type=1400 audit(1712946913.363:1441): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fcf20 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.490642 kernel: audit: type=1300 audit(1712946913.363:1441): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fcf20 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.515057 kernel: audit: type=1327 audit(1712946913.363:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.537303 kernel: audit: type=1400 audit(1712946913.363:1442): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.537394 kernel: audit: type=1300 audit(1712946913.363:1442): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fcf60 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fcf60 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.613493 kernel: audit: type=1327 audit(1712946913.363:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:13.613597 kernel: audit: type=1400 audit(1712946913.363:1443): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fdda0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:19.937222 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.sqMKS0.mount: Deactivated successfully. Apr 12 18:35:22.034153 update_engine[1331]: I0412 18:35:22.033898 1331 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:22.034153 update_engine[1331]: I0412 18:35:22.034090 1331 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:22.034528 update_engine[1331]: I0412 18:35:22.034299 1331 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:22.140739 update_engine[1331]: E0412 18:35:22.140687 1331 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:22.140914 update_engine[1331]: I0412 18:35:22.140818 1331 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 18:35:25.346637 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.4dPHGz.mount: Deactivated successfully. Apr 12 18:35:26.341032 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.D6dqZr.mount: Deactivated successfully. Apr 12 18:35:29.224000 audit[5040]: AVC avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:35:29.231211 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:35:29.231287 kernel: audit: type=1400 audit(1712946929.224:1444): avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:35:29.224000 audit[5040]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a5ac00 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:35:29.287009 kernel: audit: type=1300 audit(1712946929.224:1444): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a5ac00 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:35:29.224000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:29.311990 kernel: audit: type=1327 audit(1712946929.224:1444): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:29.467000 audit[5076]: AVC avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:35:29.467000 audit[5076]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a21260 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:35:29.521181 kernel: audit: type=1400 audit(1712946929.467:1445): avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:35:29.521352 kernel: audit: type=1300 audit(1712946929.467:1445): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a21260 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:35:29.467000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:29.546661 kernel: audit: type=1327 audit(1712946929.467:1445): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:35:29.644607 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.evEcDJ.mount: Deactivated successfully. Apr 12 18:35:32.031894 update_engine[1331]: I0412 18:35:32.031730 1331 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:32.032239 update_engine[1331]: I0412 18:35:32.031956 1331 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:32.032239 update_engine[1331]: I0412 18:35:32.032159 1331 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:32.041484 update_engine[1331]: E0412 18:35:32.041457 1331 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:32.041588 update_engine[1331]: I0412 18:35:32.041546 1331 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:35:32.041588 update_engine[1331]: I0412 18:35:32.041553 1331 omaha_request_action.cc:621] Omaha request response: Apr 12 18:35:32.041678 update_engine[1331]: E0412 18:35:32.041635 1331 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 18:35:32.041678 update_engine[1331]: I0412 18:35:32.041649 1331 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 18:35:32.041678 update_engine[1331]: I0412 18:35:32.041652 1331 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:32.041678 update_engine[1331]: I0412 18:35:32.041656 1331 update_attempter.cc:306] Processing Done. Apr 12 18:35:32.041678 update_engine[1331]: E0412 18:35:32.041668 1331 update_attempter.cc:619] Update failed. Apr 12 18:35:32.041678 update_engine[1331]: I0412 18:35:32.041674 1331 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 18:35:32.041678 update_engine[1331]: I0412 18:35:32.041677 1331 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 18:35:32.041822 update_engine[1331]: I0412 18:35:32.041682 1331 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 18:35:32.041822 update_engine[1331]: I0412 18:35:32.041743 1331 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 18:35:32.041822 update_engine[1331]: I0412 18:35:32.041760 1331 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 18:35:32.041822 update_engine[1331]: I0412 18:35:32.041764 1331 omaha_request_action.cc:271] Request: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: Apr 12 18:35:32.041822 update_engine[1331]: I0412 18:35:32.041769 1331 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 18:35:32.042074 update_engine[1331]: I0412 18:35:32.041900 1331 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 18:35:32.042074 update_engine[1331]: I0412 18:35:32.042038 1331 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Apr 12 18:35:32.042326 locksmithd[1418]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:32.081396 update_engine[1331]: E0412 18:35:32.081359 1331 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081463 1331 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081470 1331 omaha_request_action.cc:621] Omaha request response: Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081475 1331 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081478 1331 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081481 1331 update_attempter.cc:306] Processing Done. Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081485 1331 update_attempter.cc:310] Error event sent. Apr 12 18:35:32.081557 update_engine[1331]: I0412 18:35:32.081493 1331 update_check_scheduler.cc:74] Next update check in 45m22s Apr 12 18:35:32.081815 locksmithd[1418]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 18:35:49.927081 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.Qndvnp.mount: Deactivated successfully. Apr 12 18:35:55.348393 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.SUC99S.mount: Deactivated successfully. Apr 12 18:35:55.772000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.772000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.819714 kernel: audit: type=1400 audit(1712946955.772:1446): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.819830 kernel: audit: type=1400 audit(1712946955.772:1447): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.819875 kernel: audit: type=1300 audit(1712946955.772:1446): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009754180 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.772000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009754180 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.871755 kernel: audit: type=1327 audit(1712946955.772:1446): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.772000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.894383 kernel: audit: type=1400 audit(1712946955.772:1448): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.772000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009754210 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.922205 kernel: audit: type=1300 audit(1712946955.772:1448): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=4009754210 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.946634 kernel: audit: type=1327 audit(1712946955.772:1448): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.772000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4004212da0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.976671 kernel: audit: type=1300 audit(1712946955.772:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4004212da0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.772000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:56.001572 kernel: audit: type=1327 audit(1712946955.772:1447): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.781000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:56.025791 kernel: audit: type=1400 audit(1712946955.781:1449): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.781000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4009754360 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=40097544e0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4004212e00 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:35:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:35:56.190008 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.OEFLqf.mount: Deactivated successfully. Apr 12 18:35:56.342000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:56.342000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001ece6f0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:56.342000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:56.343000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:35:56.343000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ebd80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:35:56.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:35:59.642025 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.ioEo4F.mount: Deactivated successfully. Apr 12 18:36:06.318201 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.E5yEWA.mount: Deactivated successfully. Apr 12 18:36:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.369892 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:36:13.370062 kernel: audit: type=1400 audit(1712946973.363:1455): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.414824 kernel: audit: type=1400 audit(1712946973.363:1454): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.414945 kernel: audit: type=1300 audit(1712946973.363:1454): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252ae0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252ae0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.471074 kernel: audit: type=1327 audit(1712946973.363:1454): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.471288 kernel: audit: type=1400 audit(1712946973.363:1456): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252d80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.523665 kernel: audit: type=1300 audit(1712946973.363:1456): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252d80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.549803 kernel: audit: type=1327 audit(1712946973.363:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.363000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.572919 kernel: audit: type=1400 audit(1712946973.363:1457): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252f80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.603915 kernel: audit: type=1300 audit(1712946973.363:1457): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001252f80 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.629616 kernel: audit: type=1327 audit(1712946973.363:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:13.363000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400224f780 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:13.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:19.925981 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.kBDtxC.mount: Deactivated successfully. Apr 12 18:36:26.194799 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.e1HXvN.mount: Deactivated successfully. Apr 12 18:36:29.228000 audit[5040]: AVC avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:36:29.234490 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:36:29.234626 kernel: audit: type=1400 audit(1712946989.228:1458): avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:36:29.228000 audit[5040]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c56e80 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:36:29.288386 kernel: audit: type=1300 audit(1712946989.228:1458): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c56e80 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:36:29.228000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:29.314009 kernel: audit: type=1327 audit(1712946989.228:1458): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:29.466000 audit[5076]: AVC avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:36:29.466000 audit[5076]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400069c3c0 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:36:29.522170 kernel: audit: type=1400 audit(1712946989.466:1459): avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:36:29.522303 kernel: audit: type=1300 audit(1712946989.466:1459): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400069c3c0 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:36:29.466000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:29.547866 kernel: audit: type=1327 audit(1712946989.466:1459): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:36:29.640042 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.flCaps.mount: Deactivated successfully. Apr 12 18:36:49.929953 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.xnEQPZ.mount: Deactivated successfully. Apr 12 18:36:55.352206 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.it3Vlq.mount: Deactivated successfully. Apr 12 18:36:55.773000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.773000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.823453 kernel: audit: type=1400 audit(1712947015.773:1460): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.823633 kernel: audit: type=1400 audit(1712947015.773:1461): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.773000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400deef220 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.855446 kernel: audit: type=1300 audit(1712947015.773:1461): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400deef220 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.855895 kernel: audit: type=1327 audit(1712947015.773:1461): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.773000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.906901 kernel: audit: type=1400 audit(1712947015.773:1462): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.773000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400d661770 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.937576 kernel: audit: type=1300 audit(1712947015.773:1462): arch=c00000b7 syscall=27 success=no exit=-13 a0=60 a1=400d661770 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.964169 kernel: audit: type=1327 audit(1712947015.773:1462): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.773000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c092720 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.993464 kernel: audit: type=1300 audit(1712947015.773:1460): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c092720 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:56.018799 kernel: audit: type=1327 audit(1712947015.773:1460): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.782000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:56.043886 kernel: audit: type=1400 audit(1712947015.782:1463): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.782000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c092750 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.782000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.784000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.784000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400e1f6340 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:55.784000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:55.784000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400c092870 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:36:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:36:56.345529 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.8lSivT.mount: Deactivated successfully. Apr 12 18:36:56.344000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:56.344000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002c63380 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:56.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:56.344000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:36:56.344000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020b01b0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:36:56.344000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:36:59.643507 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.sRZto1.mount: Deactivated successfully. Apr 12 18:37:06.318283 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.WSljgD.mount: Deactivated successfully. Apr 12 18:37:13.364000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.370564 kernel: kauditd_printk_skb: 14 callbacks suppressed Apr 12 18:37:13.370715 kernel: audit: type=1400 audit(1712947033.364:1468): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.364000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343a0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.423828 kernel: audit: type=1300 audit(1712947033.364:1468): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343a0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.449029 kernel: audit: type=1327 audit(1712947033.364:1468): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.364000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.471371 kernel: audit: type=1400 audit(1712947033.364:1469): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.471517 kernel: audit: type=1300 audit(1712947033.364:1469): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343c0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343c0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.525881 kernel: audit: type=1327 audit(1712947033.364:1469): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.364000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.548591 kernel: audit: type=1400 audit(1712947033.364:1470): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.548749 kernel: audit: type=1300 audit(1712947033.364:1470): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029343e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.602500 kernel: audit: type=1327 audit(1712947033.364:1470): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:13.364000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.625065 kernel: audit: type=1400 audit(1712947033.364:1471): avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:13.364000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002934700 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:13.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:19.931202 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.r6d9tC.mount: Deactivated successfully. Apr 12 18:37:25.351317 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.5aGrsq.mount: Deactivated successfully. Apr 12 18:37:26.344732 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.RgZP58.mount: Deactivated successfully. Apr 12 18:37:28.557434 systemd[1]: Started sshd@7-10.200.20.10:22-10.200.12.6:46562.service. Apr 12 18:37:28.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.10:22-10.200.12.6:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:28.565634 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:37:28.565798 kernel: audit: type=1130 audit(1712947048.558:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.10:22-10.200.12.6:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:29.029429 sshd[5817]: Accepted publickey for core from 10.200.12.6 port 46562 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:29.027000 audit[5817]: USER_ACCT pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.054440 kernel: audit: type=1101 audit(1712947049.027:1473): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.054524 kernel: audit: type=1103 audit(1712947049.052:1474): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.052000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.054314 sshd[5817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:29.093869 kernel: audit: type=1006 audit(1712947049.052:1475): pid=5817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:37:29.052000 audit[5817]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd70f8420 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.118961 kernel: audit: type=1300 audit(1712947049.052:1475): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd70f8420 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:29.052000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:29.127490 kernel: audit: type=1327 audit(1712947049.052:1475): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:29.130766 systemd[1]: Started session-10.scope. Apr 12 18:37:29.131222 systemd-logind[1329]: New session 10 of user core. Apr 12 18:37:29.134000 audit[5817]: USER_START pid=5817 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.161000 audit[5819]: CRED_ACQ pid=5819 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.184685 kernel: audit: type=1105 audit(1712947049.134:1476): pid=5817 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.184786 kernel: audit: type=1103 audit(1712947049.161:1477): pid=5819 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.229000 audit[5040]: AVC avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:37:29.229000 audit[5040]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001bc8220 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:37:29.284084 kernel: audit: type=1400 audit(1712947049.229:1478): avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:37:29.284226 kernel: audit: type=1300 audit(1712947049.229:1478): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001bc8220 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:37:29.229000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:37:29.467000 audit[5076]: AVC avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:37:29.467000 audit[5076]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400069c000 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:37:29.467000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:37:29.569035 sshd[5817]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:29.568000 audit[5817]: USER_END pid=5817 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.568000 audit[5817]: CRED_DISP pid=5817 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:29.571463 systemd[1]: sshd@7-10.200.20.10:22-10.200.12.6:46562.service: Deactivated successfully. Apr 12 18:37:29.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.10:22-10.200.12.6:46562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:29.572224 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:37:29.572864 systemd-logind[1329]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:37:29.573632 systemd-logind[1329]: Removed session 10. Apr 12 18:37:29.641758 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.RuNW0H.mount: Deactivated successfully. Apr 12 18:37:34.639008 systemd[1]: Started sshd@8-10.200.20.10:22-10.200.12.6:46564.service. Apr 12 18:37:34.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.10:22-10.200.12.6:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:34.644919 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:37:34.645023 kernel: audit: type=1130 audit(1712947054.637:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.10:22-10.200.12.6:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:35.068000 audit[5855]: USER_ACCT pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.070338 sshd[5855]: Accepted publickey for core from 10.200.12.6 port 46564 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:35.092000 audit[5855]: CRED_ACQ pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.095261 sshd[5855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:35.100296 systemd[1]: Started session-11.scope. Apr 12 18:37:35.101707 systemd-logind[1329]: New session 11 of user core. Apr 12 18:37:35.117270 kernel: audit: type=1101 audit(1712947055.068:1484): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.117416 kernel: audit: type=1103 audit(1712947055.092:1485): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.131695 kernel: audit: type=1006 audit(1712947055.093:1486): pid=5855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:37:35.132113 kernel: audit: type=1300 audit(1712947055.093:1486): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6815d80 a2=3 a3=1 items=0 ppid=1 pid=5855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:35.093000 audit[5855]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6815d80 a2=3 a3=1 items=0 ppid=1 pid=5855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:35.093000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:35.164034 kernel: audit: type=1327 audit(1712947055.093:1486): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:35.164155 kernel: audit: type=1105 audit(1712947055.116:1487): pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.116000 audit[5855]: USER_START pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.118000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.211532 kernel: audit: type=1103 audit(1712947055.118:1488): pid=5857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.459972 sshd[5855]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:35.459000 audit[5855]: USER_END pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.462949 systemd-logind[1329]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:37:35.464087 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:37:35.465117 systemd-logind[1329]: Removed session 11. Apr 12 18:37:35.465779 systemd[1]: sshd@8-10.200.20.10:22-10.200.12.6:46564.service: Deactivated successfully. Apr 12 18:37:35.459000 audit[5855]: CRED_DISP pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.508184 kernel: audit: type=1106 audit(1712947055.459:1489): pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.508295 kernel: audit: type=1104 audit(1712947055.459:1490): pid=5855 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:35.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.10:22-10.200.12.6:46564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:40.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.10:22-10.200.12.6:56760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:40.528995 systemd[1]: Started sshd@9-10.200.20.10:22-10.200.12.6:56760.service. Apr 12 18:37:40.534288 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:37:40.534374 kernel: audit: type=1130 audit(1712947060.527:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.10:22-10.200.12.6:56760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:40.937000 audit[5874]: USER_ACCT pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:40.940157 sshd[5874]: Accepted publickey for core from 10.200.12.6 port 56760 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:40.942650 sshd[5874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:40.947272 systemd[1]: Started session-12.scope. Apr 12 18:37:40.948515 systemd-logind[1329]: New session 12 of user core. Apr 12 18:37:40.940000 audit[5874]: CRED_ACQ pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:40.987466 kernel: audit: type=1101 audit(1712947060.937:1493): pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:40.987586 kernel: audit: type=1103 audit(1712947060.940:1494): pid=5874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.005684 kernel: audit: type=1006 audit(1712947060.940:1495): pid=5874 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:37:40.940000 audit[5874]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9fe43b0 a2=3 a3=1 items=0 ppid=1 pid=5874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:41.036828 kernel: audit: type=1300 audit(1712947060.940:1495): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd9fe43b0 a2=3 a3=1 items=0 ppid=1 pid=5874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:40.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:41.054292 kernel: audit: type=1327 audit(1712947060.940:1495): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:40.969000 audit[5874]: USER_START pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.080590 kernel: audit: type=1105 audit(1712947060.969:1496): pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:40.971000 audit[5876]: CRED_ACQ pid=5876 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.102322 kernel: audit: type=1103 audit(1712947060.971:1497): pid=5876 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.334072 sshd[5874]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:41.333000 audit[5874]: USER_END pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.333000 audit[5874]: CRED_DISP pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.363752 systemd[1]: sshd@9-10.200.20.10:22-10.200.12.6:56760.service: Deactivated successfully. Apr 12 18:37:41.364644 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:37:41.385031 kernel: audit: type=1106 audit(1712947061.333:1498): pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.385173 kernel: audit: type=1104 audit(1712947061.333:1499): pid=5874 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:41.386144 systemd-logind[1329]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:37:41.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.10:22-10.200.12.6:56760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:41.387055 systemd-logind[1329]: Removed session 12. Apr 12 18:37:46.403563 systemd[1]: Started sshd@10-10.200.20.10:22-10.200.12.6:46628.service. Apr 12 18:37:46.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.10:22-10.200.12.6:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:46.409789 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:37:46.409870 kernel: audit: type=1130 audit(1712947066.401:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.10:22-10.200.12.6:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:46.834000 audit[5890]: USER_ACCT pid=5890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.837177 sshd[5890]: Accepted publickey for core from 10.200.12.6 port 46628 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:46.838000 sshd[5890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:46.835000 audit[5890]: CRED_ACQ pid=5890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.881862 kernel: audit: type=1101 audit(1712947066.834:1502): pid=5890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.882001 kernel: audit: type=1103 audit(1712947066.835:1503): pid=5890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.895978 kernel: audit: type=1006 audit(1712947066.835:1504): pid=5890 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:37:46.835000 audit[5890]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5e19950 a2=3 a3=1 items=0 ppid=1 pid=5890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.919965 kernel: audit: type=1300 audit(1712947066.835:1504): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5e19950 a2=3 a3=1 items=0 ppid=1 pid=5890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:46.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:46.928453 kernel: audit: type=1327 audit(1712947066.835:1504): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:46.931735 systemd[1]: Started session-13.scope. Apr 12 18:37:46.932073 systemd-logind[1329]: New session 13 of user core. Apr 12 18:37:46.935000 audit[5890]: USER_START pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.936000 audit[5892]: CRED_ACQ pid=5892 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.983701 kernel: audit: type=1105 audit(1712947066.935:1505): pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:46.983777 kernel: audit: type=1103 audit(1712947066.936:1506): pid=5892 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.244954 sshd[5890]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:47.244000 audit[5890]: USER_END pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.248608 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:37:47.249432 systemd[1]: sshd@10-10.200.20.10:22-10.200.12.6:46628.service: Deactivated successfully. Apr 12 18:37:47.245000 audit[5890]: CRED_DISP pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.273875 kernel: audit: type=1106 audit(1712947067.244:1507): pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.10:22-10.200.12.6:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:47.297362 systemd-logind[1329]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:37:47.297948 kernel: audit: type=1104 audit(1712947067.245:1508): pid=5890 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.298314 systemd-logind[1329]: Removed session 13. Apr 12 18:37:47.314530 systemd[1]: Started sshd@11-10.200.20.10:22-10.200.12.6:46636.service. Apr 12 18:37:47.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.10:22-10.200.12.6:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:47.719000 audit[5902]: USER_ACCT pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.722005 sshd[5902]: Accepted publickey for core from 10.200.12.6 port 46636 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:47.721000 audit[5902]: CRED_ACQ pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.721000 audit[5902]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe83df970 a2=3 a3=1 items=0 ppid=1 pid=5902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:47.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:47.723653 sshd[5902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:47.728030 systemd[1]: Started session-14.scope. Apr 12 18:37:47.728908 systemd-logind[1329]: New session 14 of user core. Apr 12 18:37:47.731000 audit[5902]: USER_START pid=5902 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:47.733000 audit[5904]: CRED_ACQ pid=5904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.118207 sshd[5902]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:48.117000 audit[5902]: USER_END pid=5902 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.117000 audit[5902]: CRED_DISP pid=5902 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.120829 systemd[1]: sshd@11-10.200.20.10:22-10.200.12.6:46636.service: Deactivated successfully. Apr 12 18:37:48.121594 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:37:48.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.10:22-10.200.12.6:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:48.122284 systemd-logind[1329]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:37:48.123159 systemd-logind[1329]: Removed session 14. Apr 12 18:37:48.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.10:22-10.200.12.6:46650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:48.188224 systemd[1]: Started sshd@12-10.200.20.10:22-10.200.12.6:46650.service. Apr 12 18:37:48.599264 sshd[5912]: Accepted publickey for core from 10.200.12.6 port 46650 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:48.597000 audit[5912]: USER_ACCT pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.600971 sshd[5912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:48.598000 audit[5912]: CRED_ACQ pid=5912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.598000 audit[5912]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb2388e0 a2=3 a3=1 items=0 ppid=1 pid=5912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:48.598000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:48.605347 systemd[1]: Started session-15.scope. Apr 12 18:37:48.605662 systemd-logind[1329]: New session 15 of user core. Apr 12 18:37:48.607000 audit[5912]: USER_START pid=5912 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.609000 audit[5914]: CRED_ACQ pid=5914 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.978230 sshd[5912]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:48.977000 audit[5912]: USER_END pid=5912 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.977000 audit[5912]: CRED_DISP pid=5912 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:48.981354 systemd[1]: sshd@12-10.200.20.10:22-10.200.12.6:46650.service: Deactivated successfully. Apr 12 18:37:48.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.10:22-10.200.12.6:46650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:48.982016 systemd-logind[1329]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:37:48.982090 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:37:48.983333 systemd-logind[1329]: Removed session 15. Apr 12 18:37:49.929143 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.vPB8fy.mount: Deactivated successfully. Apr 12 18:37:54.078619 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:37:54.078744 kernel: audit: type=1130 audit(1712947074.049:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.10:22-10.200.12.6:46658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:54.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.10:22-10.200.12.6:46658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:54.051063 systemd[1]: Started sshd@13-10.200.20.10:22-10.200.12.6:46658.service. Apr 12 18:37:54.467000 audit[5954]: USER_ACCT pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.469684 sshd[5954]: Accepted publickey for core from 10.200.12.6 port 46658 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:37:54.471666 sshd[5954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:37:54.469000 audit[5954]: CRED_ACQ pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.515170 kernel: audit: type=1101 audit(1712947074.467:1529): pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.515283 kernel: audit: type=1103 audit(1712947074.469:1530): pid=5954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.529572 kernel: audit: type=1006 audit(1712947074.469:1531): pid=5954 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:37:54.469000 audit[5954]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb50dcd0 a2=3 a3=1 items=0 ppid=1 pid=5954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.553401 kernel: audit: type=1300 audit(1712947074.469:1531): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb50dcd0 a2=3 a3=1 items=0 ppid=1 pid=5954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:37:54.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:54.562319 kernel: audit: type=1327 audit(1712947074.469:1531): proctitle=737368643A20636F7265205B707269765D Apr 12 18:37:54.562981 systemd-logind[1329]: New session 16 of user core. Apr 12 18:37:54.563351 systemd[1]: Started session-16.scope. Apr 12 18:37:54.567000 audit[5954]: USER_START pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.593000 audit[5956]: CRED_ACQ pid=5956 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.615419 kernel: audit: type=1105 audit(1712947074.567:1532): pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.615531 kernel: audit: type=1103 audit(1712947074.593:1533): pid=5956 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.902046 sshd[5954]: pam_unix(sshd:session): session closed for user core Apr 12 18:37:54.902000 audit[5954]: USER_END pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.905611 systemd-logind[1329]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:37:54.906899 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:37:54.908147 systemd-logind[1329]: Removed session 16. Apr 12 18:37:54.908816 systemd[1]: sshd@13-10.200.20.10:22-10.200.12.6:46658.service: Deactivated successfully. Apr 12 18:37:54.902000 audit[5954]: CRED_DISP pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.950544 kernel: audit: type=1106 audit(1712947074.902:1534): pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.950681 kernel: audit: type=1104 audit(1712947074.902:1535): pid=5954 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:37:54.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.10:22-10.200.12.6:46658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:55.776000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.776000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.776000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006723360 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:55.776000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006abaa80 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:55.776000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.776000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4008f8c720 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:55.783000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.783000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4008f8c810 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:55.786000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.786000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4006abadb0 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.786000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:55.786000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:55.786000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006723380 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:37:55.786000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:37:56.191149 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.xMkYfl.mount: Deactivated successfully. Apr 12 18:37:56.345000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:56.345000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400224eea0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:56.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:56.345000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:37:56.345000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011df500 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:37:56.345000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:37:59.642023 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.PJcT1b.mount: Deactivated successfully. Apr 12 18:37:59.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.10:22-10.200.12.6:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:37:59.977625 systemd[1]: Started sshd@14-10.200.20.10:22-10.200.12.6:34418.service. Apr 12 18:37:59.982939 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:37:59.983038 kernel: audit: type=1130 audit(1712947079.976:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.10:22-10.200.12.6:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:00.419000 audit[6028]: USER_ACCT pid=6028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.421050 sshd[6028]: Accepted publickey for core from 10.200.12.6 port 34418 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:00.445000 audit[6028]: CRED_ACQ pid=6028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.446492 sshd[6028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:00.447008 kernel: audit: type=1101 audit(1712947080.419:1546): pid=6028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.447051 kernel: audit: type=1103 audit(1712947080.445:1547): pid=6028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.483530 kernel: audit: type=1006 audit(1712947080.445:1548): pid=6028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:38:00.445000 audit[6028]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6a234c0 a2=3 a3=1 items=0 ppid=1 pid=6028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:00.507995 kernel: audit: type=1300 audit(1712947080.445:1548): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6a234c0 a2=3 a3=1 items=0 ppid=1 pid=6028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:00.511436 systemd[1]: Started session-17.scope. Apr 12 18:38:00.512786 systemd-logind[1329]: New session 17 of user core. Apr 12 18:38:00.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:00.521364 kernel: audit: type=1327 audit(1712947080.445:1548): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:00.521000 audit[6028]: USER_START pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.548385 kernel: audit: type=1105 audit(1712947080.521:1549): pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.523000 audit[6030]: CRED_ACQ pid=6030 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.569971 kernel: audit: type=1103 audit(1712947080.523:1550): pid=6030 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.845115 sshd[6028]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:00.845000 audit[6028]: USER_END pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.848320 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:38:00.849095 systemd[1]: sshd@14-10.200.20.10:22-10.200.12.6:34418.service: Deactivated successfully. Apr 12 18:38:00.846000 audit[6028]: CRED_DISP pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.873635 systemd-logind[1329]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:38:00.874570 systemd-logind[1329]: Removed session 17. Apr 12 18:38:00.894994 kernel: audit: type=1106 audit(1712947080.845:1551): pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.895149 kernel: audit: type=1104 audit(1712947080.846:1552): pid=6028 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:00.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.10:22-10.200.12.6:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:00.919634 systemd[1]: Started sshd@15-10.200.20.10:22-10.200.12.6:34432.service. Apr 12 18:38:00.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.10:22-10.200.12.6:34432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:01.366248 sshd[6045]: Accepted publickey for core from 10.200.12.6 port 34432 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:01.365000 audit[6045]: USER_ACCT pid=6045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.367592 sshd[6045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:01.366000 audit[6045]: CRED_ACQ pid=6045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.366000 audit[6045]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4b7f470 a2=3 a3=1 items=0 ppid=1 pid=6045 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:01.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:01.372509 systemd-logind[1329]: New session 18 of user core. Apr 12 18:38:01.372949 systemd[1]: Started session-18.scope. Apr 12 18:38:01.376000 audit[6045]: USER_START pid=6045 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.377000 audit[6047]: CRED_ACQ pid=6047 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.811920 sshd[6045]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:01.812000 audit[6045]: USER_END pid=6045 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.812000 audit[6045]: CRED_DISP pid=6045 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:01.815248 systemd[1]: sshd@15-10.200.20.10:22-10.200.12.6:34432.service: Deactivated successfully. Apr 12 18:38:01.815983 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:38:01.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.10:22-10.200.12.6:34432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:01.816385 systemd-logind[1329]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:38:01.817123 systemd-logind[1329]: Removed session 18. Apr 12 18:38:01.887543 systemd[1]: Started sshd@16-10.200.20.10:22-10.200.12.6:34442.service. Apr 12 18:38:01.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.10:22-10.200.12.6:34442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:02.328000 audit[6055]: USER_ACCT pid=6055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:02.329527 sshd[6055]: Accepted publickey for core from 10.200.12.6 port 34442 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:02.329000 audit[6055]: CRED_ACQ pid=6055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:02.330000 audit[6055]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd981a4b0 a2=3 a3=1 items=0 ppid=1 pid=6055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:02.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:02.331174 sshd[6055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:02.335533 systemd[1]: Started session-19.scope. Apr 12 18:38:02.336108 systemd-logind[1329]: New session 19 of user core. Apr 12 18:38:02.339000 audit[6055]: USER_START pid=6055 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:02.341000 audit[6057]: CRED_ACQ pid=6057 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.142000 audit[6069]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=6069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:04.142000 audit[6069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe6a21f20 a2=0 a3=1 items=0 ppid=2663 pid=6069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:04.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:04.147000 audit[6069]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=6069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:04.147000 audit[6069]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe6a21f20 a2=0 a3=1 items=0 ppid=2663 pid=6069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:04.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:04.168000 audit[6071]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=6071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:04.168000 audit[6071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffed0b4be0 a2=0 a3=1 items=0 ppid=2663 pid=6071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:04.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:04.169000 audit[6071]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=6071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:04.169000 audit[6071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffed0b4be0 a2=0 a3=1 items=0 ppid=2663 pid=6071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:04.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:04.231135 sshd[6055]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:04.231000 audit[6055]: USER_END pid=6055 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.231000 audit[6055]: CRED_DISP pid=6055 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.10:22-10.200.12.6:34442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:04.234030 systemd[1]: sshd@16-10.200.20.10:22-10.200.12.6:34442.service: Deactivated successfully. Apr 12 18:38:04.234784 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:38:04.236233 systemd-logind[1329]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:38:04.237574 systemd-logind[1329]: Removed session 19. Apr 12 18:38:04.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.10:22-10.200.12.6:34458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:04.303359 systemd[1]: Started sshd@17-10.200.20.10:22-10.200.12.6:34458.service. Apr 12 18:38:04.714000 audit[6074]: USER_ACCT pid=6074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.715750 sshd[6074]: Accepted publickey for core from 10.200.12.6 port 34458 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:04.715000 audit[6074]: CRED_ACQ pid=6074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.716000 audit[6074]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebe94de0 a2=3 a3=1 items=0 ppid=1 pid=6074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:04.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:04.717390 sshd[6074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:04.721287 systemd-logind[1329]: New session 20 of user core. Apr 12 18:38:04.721777 systemd[1]: Started session-20.scope. Apr 12 18:38:04.725000 audit[6074]: USER_START pid=6074 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:04.726000 audit[6076]: CRED_ACQ pid=6076 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.210691 sshd[6074]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:05.210000 audit[6074]: USER_END pid=6074 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.216783 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 18:38:05.216886 kernel: audit: type=1106 audit(1712947085.210:1582): pid=6074 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.229778 systemd[1]: sshd@17-10.200.20.10:22-10.200.12.6:34458.service: Deactivated successfully. Apr 12 18:38:05.230594 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:38:05.232016 systemd-logind[1329]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:38:05.233050 systemd-logind[1329]: Removed session 20. Apr 12 18:38:05.210000 audit[6074]: CRED_DISP pid=6074 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.263952 kernel: audit: type=1104 audit(1712947085.210:1583): pid=6074 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.10:22-10.200.12.6:34458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.285247 kernel: audit: type=1131 audit(1712947085.225:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.10:22-10.200.12.6:34458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.292723 systemd[1]: Started sshd@18-10.200.20.10:22-10.200.12.6:48796.service. Apr 12 18:38:05.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.10:22-10.200.12.6:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.315876 kernel: audit: type=1130 audit(1712947085.292:1585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.10:22-10.200.12.6:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:05.700000 audit[6084]: USER_ACCT pid=6084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.701512 sshd[6084]: Accepted publickey for core from 10.200.12.6 port 48796 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:05.703267 sshd[6084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:05.702000 audit[6084]: CRED_ACQ pid=6084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.747441 kernel: audit: type=1101 audit(1712947085.700:1586): pid=6084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.747576 kernel: audit: type=1103 audit(1712947085.702:1587): pid=6084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.747967 kernel: audit: type=1006 audit(1712947085.702:1588): pid=6084 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:38:05.702000 audit[6084]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb0d98a0 a2=3 a3=1 items=0 ppid=1 pid=6084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:05.786387 kernel: audit: type=1300 audit(1712947085.702:1588): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb0d98a0 a2=3 a3=1 items=0 ppid=1 pid=6084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:05.702000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:05.788317 kernel: audit: type=1327 audit(1712947085.702:1588): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:05.797037 systemd[1]: Started session-21.scope. Apr 12 18:38:05.797536 systemd-logind[1329]: New session 21 of user core. Apr 12 18:38:05.800000 audit[6084]: USER_START pid=6084 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.802000 audit[6086]: CRED_ACQ pid=6086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:05.828899 kernel: audit: type=1105 audit(1712947085.800:1589): pid=6084 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.109090 sshd[6084]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:06.109000 audit[6084]: USER_END pid=6084 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.109000 audit[6084]: CRED_DISP pid=6084 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:06.111894 systemd-logind[1329]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:38:06.112689 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:38:06.113345 systemd[1]: sshd@18-10.200.20.10:22-10.200.12.6:48796.service: Deactivated successfully. Apr 12 18:38:06.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.10:22-10.200.12.6:48796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:06.114184 systemd-logind[1329]: Removed session 21. Apr 12 18:38:11.099875 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 18:38:11.100024 kernel: audit: type=1325 audit(1712947091.093:1594): table=filter:130 family=2 entries=20 op=nft_register_rule pid=6116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:11.093000 audit[6116]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=6116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:11.093000 audit[6116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4c3ca70 a2=0 a3=1 items=0 ppid=2663 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:11.140873 kernel: audit: type=1300 audit(1712947091.093:1594): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe4c3ca70 a2=0 a3=1 items=0 ppid=2663 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:11.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:11.154863 kernel: audit: type=1327 audit(1712947091.093:1594): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:11.155001 kernel: audit: type=1325 audit(1712947091.093:1595): table=nat:131 family=2 entries=106 op=nft_register_chain pid=6116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:11.093000 audit[6116]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=6116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:38:11.093000 audit[6116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe4c3ca70 a2=0 a3=1 items=0 ppid=2663 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:11.196416 kernel: audit: type=1300 audit(1712947091.093:1595): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe4c3ca70 a2=0 a3=1 items=0 ppid=2663 pid=6116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:11.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:11.201064 systemd[1]: Started sshd@19-10.200.20.10:22-10.200.12.6:48802.service. Apr 12 18:38:11.211072 kernel: audit: type=1327 audit(1712947091.093:1595): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:38:11.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.10:22-10.200.12.6:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:11.235061 kernel: audit: type=1130 audit(1712947091.196:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.10:22-10.200.12.6:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:11.647000 audit[6119]: USER_ACCT pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:11.648961 sshd[6119]: Accepted publickey for core from 10.200.12.6 port 48802 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:11.678875 kernel: audit: type=1101 audit(1712947091.647:1597): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:11.678984 kernel: audit: type=1103 audit(1712947091.672:1598): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:11.672000 audit[6119]: CRED_ACQ pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:11.679274 sshd[6119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:11.710292 kernel: audit: type=1006 audit(1712947091.672:1599): pid=6119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:38:11.672000 audit[6119]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd124ace0 a2=3 a3=1 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:11.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:11.714268 systemd-logind[1329]: New session 22 of user core. Apr 12 18:38:11.714736 systemd[1]: Started session-22.scope. Apr 12 18:38:11.718000 audit[6119]: USER_START pid=6119 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:11.719000 audit[6121]: CRED_ACQ pid=6121 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.062206 sshd[6119]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:12.062000 audit[6119]: USER_END pid=6119 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.062000 audit[6119]: CRED_DISP pid=6119 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:12.065019 systemd-logind[1329]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:38:12.065110 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:38:12.066144 systemd[1]: sshd@19-10.200.20.10:22-10.200.12.6:48802.service: Deactivated successfully. Apr 12 18:38:12.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.10:22-10.200.12.6:48802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:12.066983 systemd-logind[1329]: Removed session 22. Apr 12 18:38:13.365000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:13.365000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf980 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:13.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:13.365000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:13.365000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272e2c0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:13.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:13.365000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:13.365000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400272e2e0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:13.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:13.366000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:13.366000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bf9a0 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:13.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:17.133128 systemd[1]: Started sshd@20-10.200.20.10:22-10.200.12.6:56224.service. Apr 12 18:38:17.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.10:22-10.200.12.6:56224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:17.139001 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:38:17.139116 kernel: audit: type=1130 audit(1712947097.132:1609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.10:22-10.200.12.6:56224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:17.544000 audit[6137]: USER_ACCT pid=6137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.545997 sshd[6137]: Accepted publickey for core from 10.200.12.6 port 56224 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:17.547979 sshd[6137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:17.546000 audit[6137]: CRED_ACQ pid=6137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.592537 kernel: audit: type=1101 audit(1712947097.544:1610): pid=6137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.592760 kernel: audit: type=1103 audit(1712947097.546:1611): pid=6137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.595907 systemd[1]: Started session-23.scope. Apr 12 18:38:17.597427 systemd-logind[1329]: New session 23 of user core. Apr 12 18:38:17.607220 kernel: audit: type=1006 audit(1712947097.546:1612): pid=6137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:38:17.546000 audit[6137]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe2f1150 a2=3 a3=1 items=0 ppid=1 pid=6137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:17.632272 kernel: audit: type=1300 audit(1712947097.546:1612): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe2f1150 a2=3 a3=1 items=0 ppid=1 pid=6137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:17.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:17.640559 kernel: audit: type=1327 audit(1712947097.546:1612): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:17.640654 kernel: audit: type=1105 audit(1712947097.607:1613): pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.607000 audit[6137]: USER_START pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.609000 audit[6139]: CRED_ACQ pid=6139 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.687971 kernel: audit: type=1103 audit(1712947097.609:1614): pid=6139 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.905074 sshd[6137]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:17.905000 audit[6137]: USER_END pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.905000 audit[6137]: CRED_DISP pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.933383 systemd[1]: sshd@20-10.200.20.10:22-10.200.12.6:56224.service: Deactivated successfully. Apr 12 18:38:17.934179 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:38:17.954784 kernel: audit: type=1106 audit(1712947097.905:1615): pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.954939 kernel: audit: type=1104 audit(1712947097.905:1616): pid=6137 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:17.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.10:22-10.200.12.6:56224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:17.955956 systemd-logind[1329]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:38:17.957202 systemd-logind[1329]: Removed session 23. Apr 12 18:38:19.932093 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.1fG4fR.mount: Deactivated successfully. Apr 12 18:38:22.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.10:22-10.200.12.6:56232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:22.975149 systemd[1]: Started sshd@21-10.200.20.10:22-10.200.12.6:56232.service. Apr 12 18:38:22.980407 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:22.980484 kernel: audit: type=1130 audit(1712947102.974:1618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.10:22-10.200.12.6:56232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:23.382000 audit[6176]: USER_ACCT pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.384041 sshd[6176]: Accepted publickey for core from 10.200.12.6 port 56232 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:23.408876 kernel: audit: type=1101 audit(1712947103.382:1619): pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.408000 audit[6176]: CRED_ACQ pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.409563 sshd[6176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:23.436772 systemd-logind[1329]: New session 24 of user core. Apr 12 18:38:23.437357 systemd[1]: Started session-24.scope. Apr 12 18:38:23.445962 kernel: audit: type=1103 audit(1712947103.408:1620): pid=6176 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.446034 kernel: audit: type=1006 audit(1712947103.408:1621): pid=6176 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:38:23.408000 audit[6176]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9d7bdd0 a2=3 a3=1 items=0 ppid=1 pid=6176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.472886 kernel: audit: type=1300 audit(1712947103.408:1621): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9d7bdd0 a2=3 a3=1 items=0 ppid=1 pid=6176 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:23.473180 kernel: audit: type=1327 audit(1712947103.408:1621): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:23.408000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:23.442000 audit[6176]: USER_START pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.507114 kernel: audit: type=1105 audit(1712947103.442:1622): pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.444000 audit[6178]: CRED_ACQ pid=6178 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.529560 kernel: audit: type=1103 audit(1712947103.444:1623): pid=6178 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.772077 sshd[6176]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:23.772000 audit[6176]: USER_END pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.775649 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:38:23.776467 systemd[1]: sshd@21-10.200.20.10:22-10.200.12.6:56232.service: Deactivated successfully. Apr 12 18:38:23.773000 audit[6176]: CRED_DISP pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.821469 kernel: audit: type=1106 audit(1712947103.772:1624): pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.821583 kernel: audit: type=1104 audit(1712947103.773:1625): pid=6176 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:23.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.10:22-10.200.12.6:56232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:23.821880 systemd-logind[1329]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:38:23.822667 systemd-logind[1329]: Removed session 24. Apr 12 18:38:25.351294 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.OoWgx4.mount: Deactivated successfully. Apr 12 18:38:26.190220 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.iIM5w5.mount: Deactivated successfully. Apr 12 18:38:28.853016 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:28.853154 kernel: audit: type=1130 audit(1712947108.847:1627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.10:22-10.200.12.6:36916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:28.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.10:22-10.200.12.6:36916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:28.847693 systemd[1]: Started sshd@22-10.200.20.10:22-10.200.12.6:36916.service. Apr 12 18:38:29.238000 audit[5040]: AVC avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:38:29.238000 audit[5040]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b66380 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:38:29.266007 kernel: audit: type=1400 audit(1712947109.238:1628): avc: denied { watch } for pid=5040 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_25.2627281694/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c1021 tclass=file permissive=0 Apr 12 18:38:29.238000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:29.293935 kernel: audit: type=1300 audit(1712947109.238:1628): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b66380 a2=fc6 a3=0 items=0 ppid=4916 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c1021 key=(null) Apr 12 18:38:29.319919 sshd[6225]: Accepted publickey for core from 10.200.12.6 port 36916 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:29.318000 audit[6225]: USER_ACCT pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.344221 kernel: audit: type=1327 audit(1712947109.238:1628): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:29.344320 kernel: audit: type=1101 audit(1712947109.318:1629): pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.344958 sshd[6225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:29.344000 audit[6225]: CRED_ACQ pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.368499 kernel: audit: type=1103 audit(1712947109.344:1630): pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.383385 kernel: audit: type=1006 audit(1712947109.344:1631): pid=6225 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:38:29.344000 audit[6225]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd49dc290 a2=3 a3=1 items=0 ppid=1 pid=6225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:29.408309 kernel: audit: type=1300 audit(1712947109.344:1631): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd49dc290 a2=3 a3=1 items=0 ppid=1 pid=6225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:29.344000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:29.418891 kernel: audit: type=1327 audit(1712947109.344:1631): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:29.420144 systemd[1]: Started session-25.scope. Apr 12 18:38:29.421197 systemd-logind[1329]: New session 25 of user core. Apr 12 18:38:29.425000 audit[6225]: USER_START pid=6225 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.427000 audit[6227]: CRED_ACQ pid=6227 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.452865 kernel: audit: type=1105 audit(1712947109.425:1632): pid=6225 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.470000 audit[5076]: AVC avc: denied { watch } for pid=5076 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_34_26.2172657834/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c295,c446 tclass=file permissive=0 Apr 12 18:38:29.470000 audit[5076]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400069d180 a2=fc6 a3=0 items=0 ppid=4991 pid=5076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c295,c446 key=(null) Apr 12 18:38:29.470000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:38:29.641693 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.VjaLKj.mount: Deactivated successfully. Apr 12 18:38:29.768916 sshd[6225]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:29.769000 audit[6225]: USER_END pid=6225 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.769000 audit[6225]: CRED_DISP pid=6225 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:29.773095 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:38:29.775483 systemd-logind[1329]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:38:29.775672 systemd[1]: sshd@22-10.200.20.10:22-10.200.12.6:36916.service: Deactivated successfully. Apr 12 18:38:29.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.10:22-10.200.12.6:36916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:29.777082 systemd-logind[1329]: Removed session 25. Apr 12 18:38:34.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.10:22-10.200.12.6:36928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:34.845737 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:38:34.845811 kernel: audit: type=1130 audit(1712947114.838:1638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.10:22-10.200.12.6:36928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:34.839224 systemd[1]: Started sshd@23-10.200.20.10:22-10.200.12.6:36928.service. Apr 12 18:38:35.252000 audit[6274]: USER_ACCT pid=6274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.253216 sshd[6274]: Accepted publickey for core from 10.200.12.6 port 36928 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:35.277871 kernel: audit: type=1101 audit(1712947115.252:1639): pid=6274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.278541 sshd[6274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:35.277000 audit[6274]: CRED_ACQ pid=6274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.283491 systemd[1]: Started session-26.scope. Apr 12 18:38:35.284749 systemd-logind[1329]: New session 26 of user core. Apr 12 18:38:35.317333 kernel: audit: type=1103 audit(1712947115.277:1640): pid=6274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.317462 kernel: audit: type=1006 audit(1712947115.277:1641): pid=6274 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:38:35.277000 audit[6274]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd031c870 a2=3 a3=1 items=0 ppid=1 pid=6274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:35.343041 kernel: audit: type=1300 audit(1712947115.277:1641): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd031c870 a2=3 a3=1 items=0 ppid=1 pid=6274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:35.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:35.352330 kernel: audit: type=1327 audit(1712947115.277:1641): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:35.288000 audit[6274]: USER_START pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.378737 kernel: audit: type=1105 audit(1712947115.288:1642): pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.289000 audit[6276]: CRED_ACQ pid=6276 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.400590 kernel: audit: type=1103 audit(1712947115.289:1643): pid=6276 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.640061 sshd[6274]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:35.640000 audit[6274]: USER_END pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.640000 audit[6274]: CRED_DISP pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.668226 systemd[1]: sshd@23-10.200.20.10:22-10.200.12.6:36928.service: Deactivated successfully. Apr 12 18:38:35.669202 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:38:35.689207 kernel: audit: type=1106 audit(1712947115.640:1644): pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.689318 kernel: audit: type=1104 audit(1712947115.640:1645): pid=6274 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:35.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.10:22-10.200.12.6:36928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:35.690104 systemd-logind[1329]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:38:35.691079 systemd-logind[1329]: Removed session 26. Apr 12 18:38:40.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.10:22-10.200.12.6:58696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:40.715268 systemd[1]: Started sshd@24-10.200.20.10:22-10.200.12.6:58696.service. Apr 12 18:38:40.720585 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:40.720685 kernel: audit: type=1130 audit(1712947120.714:1647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.10:22-10.200.12.6:58696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:41.157000 audit[6286]: USER_ACCT pid=6286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.158546 sshd[6286]: Accepted publickey for core from 10.200.12.6 port 58696 ssh2: RSA SHA256:FwI9mp8Uipvmjkr+VYh+76kYXjtYhCPwjtuEb1G3LpI Apr 12 18:38:41.182936 kernel: audit: type=1101 audit(1712947121.157:1648): pid=6286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.182000 audit[6286]: CRED_ACQ pid=6286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.184274 sshd[6286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:38:41.221186 kernel: audit: type=1103 audit(1712947121.182:1649): pid=6286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.221343 kernel: audit: type=1006 audit(1712947121.183:1650): pid=6286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:38:41.221374 kernel: audit: type=1300 audit(1712947121.183:1650): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8fbabe0 a2=3 a3=1 items=0 ppid=1 pid=6286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:41.183000 audit[6286]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8fbabe0 a2=3 a3=1 items=0 ppid=1 pid=6286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:41.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:41.254217 kernel: audit: type=1327 audit(1712947121.183:1650): proctitle=737368643A20636F7265205B707269765D Apr 12 18:38:41.257228 systemd[1]: Started session-27.scope. Apr 12 18:38:41.257923 systemd-logind[1329]: New session 27 of user core. Apr 12 18:38:41.261000 audit[6286]: USER_START pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.289579 kernel: audit: type=1105 audit(1712947121.261:1651): pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.289709 kernel: audit: type=1103 audit(1712947121.288:1652): pid=6288 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.288000 audit[6288]: CRED_ACQ pid=6288 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.628050 sshd[6286]: pam_unix(sshd:session): session closed for user core Apr 12 18:38:41.628000 audit[6286]: USER_END pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.656203 systemd[1]: sshd@24-10.200.20.10:22-10.200.12.6:58696.service: Deactivated successfully. Apr 12 18:38:41.657020 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:38:41.628000 audit[6286]: CRED_DISP pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.657733 systemd-logind[1329]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:38:41.678988 kernel: audit: type=1106 audit(1712947121.628:1653): pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.679120 kernel: audit: type=1104 audit(1712947121.628:1654): pid=6286 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Apr 12 18:38:41.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.10:22-10.200.12.6:58696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:38:41.679663 systemd-logind[1329]: Removed session 27. Apr 12 18:38:49.929064 systemd[1]: run-containerd-runc-k8s.io-35ca11e90253ea31c3804769a7e41efa4380043c72efa33f4c886ebad341584b-runc.Bb7GZK.mount: Deactivated successfully. Apr 12 18:38:55.348347 systemd[1]: run-containerd-runc-k8s.io-4c7587e5e292e4f030e7b033e7a22a27066c8a011f020e76224d1eb7eb212647-runc.aYy6Af.mount: Deactivated successfully. Apr 12 18:38:55.467347 systemd[1]: cri-containerd-ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926.scope: Deactivated successfully. Apr 12 18:38:55.467666 systemd[1]: cri-containerd-ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926.scope: Consumed 5.662s CPU time. Apr 12 18:38:55.466000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:38:55.472806 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:38:55.472922 kernel: audit: type=1334 audit(1712947135.466:1656): prog-id=124 op=UNLOAD Apr 12 18:38:55.480000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:38:55.488870 kernel: audit: type=1334 audit(1712947135.480:1657): prog-id=127 op=UNLOAD Apr 12 18:38:55.494700 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926-rootfs.mount: Deactivated successfully. Apr 12 18:38:55.498764 env[1341]: time="2024-04-12T18:38:55.498719784Z" level=info msg="shim disconnected" id=ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926 Apr 12 18:38:55.499228 env[1341]: time="2024-04-12T18:38:55.499203817Z" level=warning msg="cleaning up after shim disconnected" id=ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926 namespace=k8s.io Apr 12 18:38:55.499309 env[1341]: time="2024-04-12T18:38:55.499296096Z" level=info msg="cleaning up dead shim" Apr 12 18:38:55.507274 env[1341]: time="2024-04-12T18:38:55.507235155Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6360 runtime=io.containerd.runc.v2\n" Apr 12 18:38:55.777000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.777000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009033b60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.828758 kernel: audit: type=1400 audit(1712947135.777:1658): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.828913 kernel: audit: type=1300 audit(1712947135.777:1658): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009033b60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.853125 kernel: audit: type=1327 audit(1712947135.777:1658): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.777000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.876600 kernel: audit: type=1400 audit(1712947135.777:1659): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=523037 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.876741 kernel: audit: type=1300 audit(1712947135.777:1659): arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400953f350 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.777000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400953f350 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.929698 kernel: audit: type=1327 audit(1712947135.777:1659): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.777000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.952238 kernel: audit: type=1400 audit(1712947135.777:1660): avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.952372 kernel: audit: type=1300 audit(1712947135.777:1660): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4004374d60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.777000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4004374d60 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.784000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=523043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.784000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009033c80 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.787000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.787000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400953f500 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:55.787000 audit[2301]: AVC avc: denied { watch } for pid=2301 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:55.787000 audit[2301]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4004374f80 a2=fc6 a3=0 items=0 ppid=2158 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c208,c820 key=(null) Apr 12 18:38:55.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Apr 12 18:38:56.192091 systemd[1]: run-containerd-runc-k8s.io-ec9027b397f871442cf9515d7ec680b8b0d6886a3260c6d6d376a448d1fa7d2e-runc.t6xlFI.mount: Deactivated successfully. Apr 12 18:38:56.346000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:56.346000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001344900 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:56.346000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:56.346000 audit[2359]: AVC avc: denied { watch } for pid=2359 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:38:56.346000 audit[2359]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007d7960 a2=fc6 a3=0 items=0 ppid=2218 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:38:56.346000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:38:56.388196 kubelet[2476]: I0412 18:38:56.387887 2476 scope.go:117] "RemoveContainer" containerID="ddfe92e72c16300aee4ae5ab811a8667271813d83ed187f902066d9b29d6a926" Apr 12 18:38:56.389830 env[1341]: time="2024-04-12T18:38:56.389797014Z" level=info msg="CreateContainer within sandbox \"4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Apr 12 18:38:56.413584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1171570071.mount: Deactivated successfully. Apr 12 18:38:56.426678 env[1341]: time="2024-04-12T18:38:56.426616429Z" level=info msg="CreateContainer within sandbox \"4de89cb5e1e6ab31e458b93769aa828d00cc0aca11b45f43eef3c1db1c1ecb3f\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4\"" Apr 12 18:38:56.427233 env[1341]: time="2024-04-12T18:38:56.427200462Z" level=info msg="StartContainer for \"932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4\"" Apr 12 18:38:56.443431 systemd[1]: Started cri-containerd-932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4.scope. Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.459000 audit: BPF prog-id=203 op=LOAD Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2567 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:56.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326136316438666261373263356462383162633434316165633839 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2567 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:56.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326136316438666261373263356462383162633434316165633839 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.460000 audit: BPF prog-id=204 op=LOAD Apr 12 18:38:56.460000 audit[6401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2567 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:56.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326136316438666261373263356462383162633434316165633839 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.461000 audit: BPF prog-id=205 op=LOAD Apr 12 18:38:56.461000 audit[6401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2567 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:56.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326136316438666261373263356462383162633434316165633839 Apr 12 18:38:56.462000 audit: BPF prog-id=205 op=UNLOAD Apr 12 18:38:56.462000 audit: BPF prog-id=204 op=UNLOAD Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:56.462000 audit: BPF prog-id=206 op=LOAD Apr 12 18:38:56.462000 audit[6401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2567 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:56.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326136316438666261373263356462383162633434316165633839 Apr 12 18:38:56.479906 env[1341]: time="2024-04-12T18:38:56.479861597Z" level=info msg="StartContainer for \"932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4\" returns successfully" Apr 12 18:38:56.702806 kubelet[2476]: E0412 18:38:56.702705 2476 controller.go:195] "Failed to update lease" err="the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io ci-3510.3.3-a-acc6b8d17d)" Apr 12 18:38:57.178703 kubelet[2476]: E0412 18:38:57.178653 2476 controller.go:195] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.10:50066->10.200.20.22:2379: read: connection timed out" Apr 12 18:38:57.184097 systemd[1]: cri-containerd-007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5.scope: Deactivated successfully. Apr 12 18:38:57.184422 systemd[1]: cri-containerd-007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5.scope: Consumed 2.196s CPU time. Apr 12 18:38:57.185000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:38:57.185000 audit: BPF prog-id=104 op=UNLOAD Apr 12 18:38:57.202210 env[1341]: time="2024-04-12T18:38:57.202165265Z" level=info msg="shim disconnected" id=007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5 Apr 12 18:38:57.202579 env[1341]: time="2024-04-12T18:38:57.202557501Z" level=warning msg="cleaning up after shim disconnected" id=007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5 namespace=k8s.io Apr 12 18:38:57.202662 env[1341]: time="2024-04-12T18:38:57.202648859Z" level=info msg="cleaning up dead shim" Apr 12 18:38:57.211092 env[1341]: time="2024-04-12T18:38:57.211049034Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6442 runtime=io.containerd.runc.v2\n" Apr 12 18:38:57.384747 systemd[1]: cri-containerd-f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3.scope: Deactivated successfully. Apr 12 18:38:57.385137 systemd[1]: cri-containerd-f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3.scope: Consumed 4.131s CPU time. Apr 12 18:38:57.388000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:38:57.388000 audit: BPF prog-id=100 op=UNLOAD Apr 12 18:38:57.395295 kubelet[2476]: I0412 18:38:57.394709 2476 scope.go:117] "RemoveContainer" containerID="007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5" Apr 12 18:38:57.398337 env[1341]: time="2024-04-12T18:38:57.398259771Z" level=info msg="CreateContainer within sandbox \"37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Apr 12 18:38:57.410579 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-007e9dcd6e292421d5663b14da06be8db7dd8839117caee2510b1cf07dab81c5-rootfs.mount: Deactivated successfully. Apr 12 18:38:57.417566 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3-rootfs.mount: Deactivated successfully. Apr 12 18:38:57.420361 env[1341]: time="2024-04-12T18:38:57.418729675Z" level=info msg="shim disconnected" id=f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3 Apr 12 18:38:57.420361 env[1341]: time="2024-04-12T18:38:57.418767834Z" level=warning msg="cleaning up after shim disconnected" id=f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3 namespace=k8s.io Apr 12 18:38:57.420361 env[1341]: time="2024-04-12T18:38:57.418775954Z" level=info msg="cleaning up dead shim" Apr 12 18:38:57.430125 env[1341]: time="2024-04-12T18:38:57.429624058Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:38:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6466 runtime=io.containerd.runc.v2\n" Apr 12 18:38:57.445862 env[1341]: time="2024-04-12T18:38:57.445788336Z" level=info msg="CreateContainer within sandbox \"37d2b82fdc3fc3f71447aeba7b1d829f31b9ce99e831d2086f6930534f6e5537\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"4c264d71d71793eb9ae83f18ada27b8bdf8e4551b846116f091d9d4924775180\"" Apr 12 18:38:57.450793 env[1341]: time="2024-04-12T18:38:57.450760034Z" level=info msg="StartContainer for \"4c264d71d71793eb9ae83f18ada27b8bdf8e4551b846116f091d9d4924775180\"" Apr 12 18:38:57.465167 systemd[1]: Started cri-containerd-4c264d71d71793eb9ae83f18ada27b8bdf8e4551b846116f091d9d4924775180.scope. Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.477000 audit: BPF prog-id=207 op=LOAD Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2189 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463323634643731643731373933656239616538336631386164613237 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2189 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463323634643731643731373933656239616538336631386164613237 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit: BPF prog-id=208 op=LOAD Apr 12 18:38:57.478000 audit[6487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2189 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463323634643731643731373933656239616538336631386164613237 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit: BPF prog-id=209 op=LOAD Apr 12 18:38:57.478000 audit[6487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2189 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463323634643731643731373933656239616538336631386164613237 Apr 12 18:38:57.478000 audit: BPF prog-id=209 op=UNLOAD Apr 12 18:38:57.478000 audit: BPF prog-id=208 op=UNLOAD Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { perfmon } for pid=6487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit[6487]: AVC avc: denied { bpf } for pid=6487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:57.478000 audit: BPF prog-id=210 op=LOAD Apr 12 18:38:57.478000 audit[6487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2189 pid=6487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:57.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463323634643731643731373933656239616538336631386164613237 Apr 12 18:38:57.505669 env[1341]: time="2024-04-12T18:38:57.505591027Z" level=info msg="StartContainer for \"4c264d71d71793eb9ae83f18ada27b8bdf8e4551b846116f091d9d4924775180\" returns successfully" Apr 12 18:38:58.406714 kubelet[2476]: I0412 18:38:58.406684 2476 scope.go:117] "RemoveContainer" containerID="f3ae7ed9671ab47458ba1a1b1ca2fb2e8894de2fc60c602061a8431e01b9aaf3" Apr 12 18:38:58.409177 env[1341]: time="2024-04-12T18:38:58.409143357Z" level=info msg="CreateContainer within sandbox \"fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Apr 12 18:38:58.449763 env[1341]: time="2024-04-12T18:38:58.449708253Z" level=info msg="CreateContainer within sandbox \"fc48d0c9e6911f493d1ce8783fb2c1df53137043c035582aee97181031e083c5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"f4b2468a43dcdc8169295f0f79abe6d6e575cbe8510aff02b5a4e86e9fde7386\"" Apr 12 18:38:58.450328 env[1341]: time="2024-04-12T18:38:58.450303806Z" level=info msg="StartContainer for \"f4b2468a43dcdc8169295f0f79abe6d6e575cbe8510aff02b5a4e86e9fde7386\"" Apr 12 18:38:58.471316 systemd[1]: Started cri-containerd-f4b2468a43dcdc8169295f0f79abe6d6e575cbe8510aff02b5a4e86e9fde7386.scope. Apr 12 18:38:58.479088 systemd[1]: run-containerd-runc-k8s.io-f4b2468a43dcdc8169295f0f79abe6d6e575cbe8510aff02b5a4e86e9fde7386-runc.AJnpBu.mount: Deactivated successfully. Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit: BPF prog-id=211 op=LOAD Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2218 pid=6523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:58.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634623234363861343364636463383136393239356630663739616265 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2218 pid=6523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:58.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634623234363861343364636463383136393239356630663739616265 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit: BPF prog-id=212 op=LOAD Apr 12 18:38:58.491000 audit[6523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2218 pid=6523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:58.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634623234363861343364636463383136393239356630663739616265 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit: BPF prog-id=213 op=LOAD Apr 12 18:38:58.491000 audit[6523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2218 pid=6523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:58.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634623234363861343364636463383136393239356630663739616265 Apr 12 18:38:58.491000 audit: BPF prog-id=213 op=UNLOAD Apr 12 18:38:58.491000 audit: BPF prog-id=212 op=UNLOAD Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { perfmon } for pid=6523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit[6523]: AVC avc: denied { bpf } for pid=6523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:38:58.491000 audit: BPF prog-id=214 op=LOAD Apr 12 18:38:58.491000 audit[6523]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2218 pid=6523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:38:58.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634623234363861343364636463383136393239356630663739616265 Apr 12 18:38:58.519638 env[1341]: time="2024-04-12T18:38:58.519566186Z" level=info msg="StartContainer for \"f4b2468a43dcdc8169295f0f79abe6d6e575cbe8510aff02b5a4e86e9fde7386\" returns successfully" Apr 12 18:38:59.642779 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.seG5KE.mount: Deactivated successfully. Apr 12 18:38:59.992378 kubelet[2476]: E0412 18:38:59.992342 2476 event.go:346] "Server rejected event (will not retry!)" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.10:57830->10.200.20.22:2379: read: connection timed out" event="&Event{ObjectMeta:{kube-apiserver-ci-3510.3.3-a-acc6b8d17d.17c59c56b5ac51f3 kube-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:kube-system,Name:kube-apiserver-ci-3510.3.3-a-acc6b8d17d,UID:257b38bbb4db0bb14e2a5fcd78223ee2,APIVersion:v1,ResourceVersion:,FieldPath:spec.containers{kube-apiserver},},Reason:Unhealthy,Message:Readiness probe failed: HTTP probe failed with statuscode: 500,Source:EventSource{Component:kubelet,Host:ci-3510.3.3-a-acc6b8d17d,},FirstTimestamp:2024-04-12 18:38:49.513431539 +0000 UTC m=+350.160081565,LastTimestamp:2024-04-12 18:38:49.513431539 +0000 UTC m=+350.160081565,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.3-a-acc6b8d17d,}" Apr 12 18:39:00.580000 audit[6533]: AVC avc: denied { watch } for pid=6533 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:39:00.587677 kernel: kauditd_printk_skb: 191 callbacks suppressed Apr 12 18:39:00.587813 kernel: audit: type=1400 audit(1712947140.580:1724): avc: denied { watch } for pid=6533 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=523041 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:39:00.582000 audit[6533]: AVC avc: denied { watch } for pid=6533 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:39:00.632276 kernel: audit: type=1400 audit(1712947140.582:1725): avc: denied { watch } for pid=6533 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=523035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:39:00.582000 audit[6533]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000076520 a2=fc6 a3=0 items=0 ppid=2218 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:39:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:39:00.686281 kernel: audit: type=1300 audit(1712947140.582:1725): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000076520 a2=fc6 a3=0 items=0 ppid=2218 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:39:00.686421 kernel: audit: type=1327 audit(1712947140.582:1725): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:39:00.686458 kernel: audit: type=1300 audit(1712947140.580:1724): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40005cc000 a2=fc6 a3=0 items=0 ppid=2218 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:39:00.580000 audit[6533]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40005cc000 a2=fc6 a3=0 items=0 ppid=2218 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c755 key=(null) Apr 12 18:39:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:39:00.739344 kernel: audit: type=1327 audit(1712947140.580:1724): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:39:06.007993 kubelet[2476]: I0412 18:39:06.007950 2476 status_manager.go:853] "Failed to get status for pod" podUID="257b38bbb4db0bb14e2a5fcd78223ee2" pod="kube-system/kube-apiserver-ci-3510.3.3-a-acc6b8d17d" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.10:49998->10.200.20.22:2379: read: connection timed out" Apr 12 18:39:06.314723 systemd[1]: run-containerd-runc-k8s.io-4ea1be22267542d860895d7e5f0a416260b06a45d3cc998b0d1a9b99f437854b-runc.Flrpum.mount: Deactivated successfully. Apr 12 18:39:07.179305 kubelet[2476]: E0412 18:39:07.179251 2476 controller.go:195] "Failed to update lease" err="Put \"https://10.200.20.10:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.3-a-acc6b8d17d?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Apr 12 18:39:07.994709 systemd[1]: cri-containerd-932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4.scope: Deactivated successfully. Apr 12 18:39:07.993000 audit: BPF prog-id=203 op=UNLOAD Apr 12 18:39:08.002867 kernel: audit: type=1334 audit(1712947147.993:1726): prog-id=203 op=UNLOAD Apr 12 18:39:08.002000 audit: BPF prog-id=206 op=UNLOAD Apr 12 18:39:08.011862 kernel: audit: type=1334 audit(1712947148.002:1727): prog-id=206 op=UNLOAD Apr 12 18:39:08.025449 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-932a61d8fba72c5db81bc441aec89b021f5c8addc3395f0b6bad0aaf756794f4-rootfs.mount: Deactivated successfully. Apr 12 18:39:08.061245 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#57 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.061741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#55 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.061916 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#56 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.071158 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#58 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Apr 12 18:39:08.089160 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#54 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001