Mar 17 18:47:47.994829 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 18:47:47.994861 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:47:47.994872 kernel: BIOS-provided physical RAM map: Mar 17 18:47:47.994878 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Mar 17 18:47:47.994887 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Mar 17 18:47:47.994893 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Mar 17 18:47:47.994903 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Mar 17 18:47:47.994911 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Mar 17 18:47:47.994918 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Mar 17 18:47:47.994925 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Mar 17 18:47:47.994931 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Mar 17 18:47:47.994939 kernel: printk: bootconsole [earlyser0] enabled Mar 17 18:47:47.994946 kernel: NX (Execute Disable) protection: active Mar 17 18:47:47.994954 kernel: efi: EFI v2.70 by Microsoft Mar 17 18:47:47.994965 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Mar 17 18:47:47.994973 kernel: random: crng init done Mar 17 18:47:47.994981 kernel: SMBIOS 3.1.0 present. Mar 17 18:47:47.994989 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Mar 17 18:47:47.994996 kernel: Hypervisor detected: Microsoft Hyper-V Mar 17 18:47:47.995003 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Mar 17 18:47:47.995012 kernel: Hyper-V Host Build:20348-10.0-1-0.1799 Mar 17 18:47:47.995019 kernel: Hyper-V: Nested features: 0x1e0101 Mar 17 18:47:47.995029 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Mar 17 18:47:47.995035 kernel: Hyper-V: Using hypercall for remote TLB flush Mar 17 18:47:47.995044 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Mar 17 18:47:47.995051 kernel: tsc: Marking TSC unstable due to running on Hyper-V Mar 17 18:47:47.995061 kernel: tsc: Detected 2593.906 MHz processor Mar 17 18:47:47.995068 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 18:47:47.995076 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 18:47:47.995084 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Mar 17 18:47:47.995090 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 18:47:47.995100 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Mar 17 18:47:47.995108 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Mar 17 18:47:47.995116 kernel: Using GB pages for direct mapping Mar 17 18:47:47.995124 kernel: Secure boot disabled Mar 17 18:47:47.995132 kernel: ACPI: Early table checksum verification disabled Mar 17 18:47:47.995140 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Mar 17 18:47:47.995146 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995156 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995164 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Mar 17 18:47:47.995177 kernel: ACPI: FACS 0x000000003FFFE000 000040 Mar 17 18:47:47.995185 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995194 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995203 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995211 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995218 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995229 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995240 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:47:47.995247 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Mar 17 18:47:47.995255 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Mar 17 18:47:47.995263 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Mar 17 18:47:47.995274 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Mar 17 18:47:47.995281 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Mar 17 18:47:47.995289 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Mar 17 18:47:47.995300 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Mar 17 18:47:47.995309 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Mar 17 18:47:47.995316 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Mar 17 18:47:47.995325 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Mar 17 18:47:47.995333 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 18:47:47.995343 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 18:47:47.995349 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Mar 17 18:47:47.995359 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Mar 17 18:47:47.995367 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Mar 17 18:47:47.995379 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Mar 17 18:47:47.995385 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Mar 17 18:47:47.995395 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Mar 17 18:47:47.995404 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Mar 17 18:47:47.995412 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Mar 17 18:47:47.995422 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Mar 17 18:47:47.995434 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Mar 17 18:47:47.995448 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Mar 17 18:47:47.995461 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Mar 17 18:47:47.995478 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Mar 17 18:47:47.995496 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Mar 17 18:47:47.995509 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Mar 17 18:47:47.995522 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Mar 17 18:47:47.995537 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Mar 17 18:47:47.995550 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Mar 17 18:47:47.995564 kernel: Zone ranges: Mar 17 18:47:47.995577 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 18:47:47.995593 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 17 18:47:47.995610 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Mar 17 18:47:47.995623 kernel: Movable zone start for each node Mar 17 18:47:47.995638 kernel: Early memory node ranges Mar 17 18:47:47.995652 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Mar 17 18:47:47.995665 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Mar 17 18:47:47.995680 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Mar 17 18:47:47.995694 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Mar 17 18:47:47.995708 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Mar 17 18:47:47.995722 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 18:47:47.995741 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Mar 17 18:47:47.995754 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Mar 17 18:47:47.995768 kernel: ACPI: PM-Timer IO Port: 0x408 Mar 17 18:47:47.995781 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Mar 17 18:47:47.995795 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Mar 17 18:47:47.995809 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 18:47:47.995823 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 18:47:47.995837 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Mar 17 18:47:47.995857 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 18:47:47.995873 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Mar 17 18:47:47.995888 kernel: Booting paravirtualized kernel on Hyper-V Mar 17 18:47:47.995901 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 18:47:47.995914 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 18:47:47.995927 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 18:47:47.995940 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 18:47:47.995954 kernel: pcpu-alloc: [0] 0 1 Mar 17 18:47:47.995968 kernel: Hyper-V: PV spinlocks enabled Mar 17 18:47:47.995981 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 18:47:47.996001 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Mar 17 18:47:47.996014 kernel: Policy zone: Normal Mar 17 18:47:47.996031 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:47:47.996046 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:47:47.996060 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 17 18:47:47.996074 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:47:47.996090 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:47:47.996107 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 308112K reserved, 0K cma-reserved) Mar 17 18:47:47.996123 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:47:47.996138 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 18:47:47.996165 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 18:47:47.996182 kernel: rcu: Hierarchical RCU implementation. Mar 17 18:47:47.996197 kernel: rcu: RCU event tracing is enabled. Mar 17 18:47:47.996212 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:47:47.996227 kernel: Rude variant of Tasks RCU enabled. Mar 17 18:47:47.996242 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:47:47.996257 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:47:47.996271 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:47:47.996287 kernel: Using NULL legacy PIC Mar 17 18:47:47.996305 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Mar 17 18:47:47.996317 kernel: Console: colour dummy device 80x25 Mar 17 18:47:47.996328 kernel: printk: console [tty1] enabled Mar 17 18:47:47.996348 kernel: printk: console [ttyS0] enabled Mar 17 18:47:47.996359 kernel: printk: bootconsole [earlyser0] disabled Mar 17 18:47:47.996375 kernel: ACPI: Core revision 20210730 Mar 17 18:47:47.996386 kernel: Failed to register legacy timer interrupt Mar 17 18:47:48.009923 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 18:47:48.009958 kernel: Hyper-V: Using IPI hypercalls Mar 17 18:47:48.009974 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Mar 17 18:47:48.009989 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 17 18:47:48.010004 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Mar 17 18:47:48.010018 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 18:47:48.010031 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 18:47:48.010046 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 18:47:48.010065 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 18:47:48.010080 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Mar 17 18:47:48.010094 kernel: RETBleed: Vulnerable Mar 17 18:47:48.010108 kernel: Speculative Store Bypass: Vulnerable Mar 17 18:47:48.010121 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 18:47:48.010135 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 18:47:48.010149 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 18:47:48.010163 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 18:47:48.010176 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 18:47:48.010190 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Mar 17 18:47:48.010207 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Mar 17 18:47:48.010221 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Mar 17 18:47:48.010234 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 18:47:48.010248 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Mar 17 18:47:48.010261 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Mar 17 18:47:48.010275 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Mar 17 18:47:48.010288 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Mar 17 18:47:48.010302 kernel: Freeing SMP alternatives memory: 32K Mar 17 18:47:48.010316 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:47:48.010329 kernel: LSM: Security Framework initializing Mar 17 18:47:48.010343 kernel: SELinux: Initializing. Mar 17 18:47:48.010357 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:47:48.010374 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 18:47:48.010387 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Mar 17 18:47:48.010401 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Mar 17 18:47:48.010415 kernel: signal: max sigframe size: 3632 Mar 17 18:47:48.010430 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:47:48.010444 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 18:47:48.010457 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:47:48.010471 kernel: x86: Booting SMP configuration: Mar 17 18:47:48.010485 kernel: .... node #0, CPUs: #1 Mar 17 18:47:48.010499 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Mar 17 18:47:48.010517 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 17 18:47:48.010531 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:47:48.010545 kernel: smpboot: Max logical packages: 1 Mar 17 18:47:48.010559 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Mar 17 18:47:48.010573 kernel: devtmpfs: initialized Mar 17 18:47:48.010587 kernel: x86/mm: Memory block size: 128MB Mar 17 18:47:48.010600 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Mar 17 18:47:48.010614 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:47:48.010631 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:47:48.010645 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:47:48.010659 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:47:48.010673 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:47:48.010687 kernel: audit: type=2000 audit(1742237266.023:1): state=initialized audit_enabled=0 res=1 Mar 17 18:47:48.010700 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:47:48.010714 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 18:47:48.010728 kernel: cpuidle: using governor menu Mar 17 18:47:48.010741 kernel: ACPI: bus type PCI registered Mar 17 18:47:48.010758 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:47:48.010772 kernel: dca service started, version 1.12.1 Mar 17 18:47:48.010786 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 18:47:48.010800 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:47:48.010814 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:47:48.010828 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:47:48.010842 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:47:48.014724 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:47:48.014746 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:47:48.014767 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:47:48.014781 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:47:48.014795 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:47:48.014809 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 18:47:48.014823 kernel: ACPI: Interpreter enabled Mar 17 18:47:48.014837 kernel: ACPI: PM: (supports S0 S5) Mar 17 18:47:48.014864 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 18:47:48.014878 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 18:47:48.014890 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Mar 17 18:47:48.014906 kernel: iommu: Default domain type: Translated Mar 17 18:47:48.014920 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 18:47:48.014933 kernel: vgaarb: loaded Mar 17 18:47:48.014946 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:47:48.014959 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:47:48.014972 kernel: PTP clock support registered Mar 17 18:47:48.014986 kernel: Registered efivars operations Mar 17 18:47:48.015000 kernel: PCI: Using ACPI for IRQ routing Mar 17 18:47:48.015014 kernel: PCI: System does not support PCI Mar 17 18:47:48.015030 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Mar 17 18:47:48.015044 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:47:48.015058 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:47:48.015072 kernel: pnp: PnP ACPI init Mar 17 18:47:48.015086 kernel: pnp: PnP ACPI: found 3 devices Mar 17 18:47:48.015100 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 18:47:48.015114 kernel: NET: Registered PF_INET protocol family Mar 17 18:47:48.015128 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 18:47:48.015143 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 17 18:47:48.015159 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:47:48.015173 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:47:48.015187 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 17 18:47:48.015201 kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 17 18:47:48.015215 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:47:48.015229 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 18:47:48.015243 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:47:48.015256 kernel: NET: Registered PF_XDP protocol family Mar 17 18:47:48.015270 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:47:48.015286 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 18:47:48.015300 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Mar 17 18:47:48.015315 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 18:47:48.015328 kernel: Initialise system trusted keyrings Mar 17 18:47:48.015343 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Mar 17 18:47:48.015357 kernel: Key type asymmetric registered Mar 17 18:47:48.015370 kernel: Asymmetric key parser 'x509' registered Mar 17 18:47:48.015384 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:47:48.015398 kernel: io scheduler mq-deadline registered Mar 17 18:47:48.015415 kernel: io scheduler kyber registered Mar 17 18:47:48.015428 kernel: io scheduler bfq registered Mar 17 18:47:48.015442 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 18:47:48.015456 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:47:48.015469 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 18:47:48.015483 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Mar 17 18:47:48.015498 kernel: i8042: PNP: No PS/2 controller found. Mar 17 18:47:48.015673 kernel: rtc_cmos 00:02: registered as rtc0 Mar 17 18:47:48.015793 kernel: rtc_cmos 00:02: setting system clock to 2025-03-17T18:47:47 UTC (1742237267) Mar 17 18:47:48.015913 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Mar 17 18:47:48.015931 kernel: intel_pstate: CPU model not supported Mar 17 18:47:48.015946 kernel: efifb: probing for efifb Mar 17 18:47:48.015959 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Mar 17 18:47:48.015973 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Mar 17 18:47:48.015988 kernel: efifb: scrolling: redraw Mar 17 18:47:48.016001 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 17 18:47:48.016016 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 18:47:48.016033 kernel: fb0: EFI VGA frame buffer device Mar 17 18:47:48.016047 kernel: pstore: Registered efi as persistent store backend Mar 17 18:47:48.016061 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:47:48.016075 kernel: Segment Routing with IPv6 Mar 17 18:47:48.016089 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:47:48.016106 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:47:48.016120 kernel: Key type dns_resolver registered Mar 17 18:47:48.016134 kernel: IPI shorthand broadcast: enabled Mar 17 18:47:48.016148 kernel: sched_clock: Marking stable (709271000, 19994000)->(892687400, -163422400) Mar 17 18:47:48.016164 kernel: registered taskstats version 1 Mar 17 18:47:48.016178 kernel: Loading compiled-in X.509 certificates Mar 17 18:47:48.016192 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 18:47:48.016205 kernel: Key type .fscrypt registered Mar 17 18:47:48.016219 kernel: Key type fscrypt-provisioning registered Mar 17 18:47:48.016233 kernel: pstore: Using crash dump compression: deflate Mar 17 18:47:48.016247 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 18:47:48.016261 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:47:48.016278 kernel: ima: No architecture policies found Mar 17 18:47:48.016292 kernel: clk: Disabling unused clocks Mar 17 18:47:48.016306 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 18:47:48.016319 kernel: Write protecting the kernel read-only data: 28672k Mar 17 18:47:48.016333 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 18:47:48.016348 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 18:47:48.016361 kernel: Run /init as init process Mar 17 18:47:48.016375 kernel: with arguments: Mar 17 18:47:48.016389 kernel: /init Mar 17 18:47:48.016405 kernel: with environment: Mar 17 18:47:48.016418 kernel: HOME=/ Mar 17 18:47:48.016431 kernel: TERM=linux Mar 17 18:47:48.016444 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:47:48.016462 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:47:48.016479 systemd[1]: Detected virtualization microsoft. Mar 17 18:47:48.016494 systemd[1]: Detected architecture x86-64. Mar 17 18:47:48.016508 systemd[1]: Running in initrd. Mar 17 18:47:48.016524 systemd[1]: No hostname configured, using default hostname. Mar 17 18:47:48.016538 systemd[1]: Hostname set to . Mar 17 18:47:48.016554 systemd[1]: Initializing machine ID from random generator. Mar 17 18:47:48.016568 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:47:48.016583 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:47:48.016597 systemd[1]: Reached target cryptsetup.target. Mar 17 18:47:48.016612 systemd[1]: Reached target paths.target. Mar 17 18:47:48.016626 systemd[1]: Reached target slices.target. Mar 17 18:47:48.016641 systemd[1]: Reached target swap.target. Mar 17 18:47:48.016657 systemd[1]: Reached target timers.target. Mar 17 18:47:48.016673 systemd[1]: Listening on iscsid.socket. Mar 17 18:47:48.016687 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:47:48.016702 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:47:48.016717 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:47:48.016731 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:47:48.016746 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:47:48.016763 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:47:48.016778 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:47:48.016793 systemd[1]: Reached target sockets.target. Mar 17 18:47:48.016808 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:47:48.016822 systemd[1]: Finished network-cleanup.service. Mar 17 18:47:48.016837 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:47:48.016867 systemd[1]: Starting systemd-journald.service... Mar 17 18:47:48.016882 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:47:48.016896 systemd[1]: Starting systemd-resolved.service... Mar 17 18:47:48.016915 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:47:48.016929 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:47:48.016948 systemd-journald[183]: Journal started Mar 17 18:47:48.017014 systemd-journald[183]: Runtime Journal (/run/log/journal/73a6bdd874e64b2d842f21e66b0d1a8f) is 8.0M, max 159.0M, 151.0M free. Mar 17 18:47:48.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.033662 kernel: audit: type=1130 audit(1742237268.019:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.033702 systemd[1]: Started systemd-journald.service. Mar 17 18:47:48.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.046830 systemd-modules-load[184]: Inserted module 'overlay' Mar 17 18:47:48.049105 kernel: audit: type=1130 audit(1742237268.035:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.049369 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:47:48.054193 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:47:48.059774 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:47:48.064561 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:47:48.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.083068 kernel: audit: type=1130 audit(1742237268.053:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.106569 kernel: audit: type=1130 audit(1742237268.057:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.094070 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:47:48.103772 systemd-resolved[185]: Positive Trust Anchors: Mar 17 18:47:48.103784 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:47:48.103834 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:47:48.136533 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:47:48.120181 systemd-resolved[185]: Defaulting to hostname 'linux'. Mar 17 18:47:48.121086 systemd[1]: Started systemd-resolved.service. Mar 17 18:47:48.142138 kernel: Bridge firewalling registered Mar 17 18:47:48.134584 systemd[1]: Reached target nss-lookup.target. Mar 17 18:47:48.141837 systemd-modules-load[184]: Inserted module 'br_netfilter' Mar 17 18:47:48.157858 kernel: audit: type=1130 audit(1742237268.103:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.174280 kernel: audit: type=1130 audit(1742237268.133:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.169036 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:47:48.172346 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:47:48.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.188896 kernel: audit: type=1130 audit(1742237268.170:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.191692 dracut-cmdline[202]: dracut-dracut-053 Mar 17 18:47:48.194311 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 18:47:48.211869 kernel: SCSI subsystem initialized Mar 17 18:47:48.235639 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:47:48.235685 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:47:48.240861 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:47:48.244667 systemd-modules-load[184]: Inserted module 'dm_multipath' Mar 17 18:47:48.247518 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:47:48.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.252335 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:47:48.267408 kernel: audit: type=1130 audit(1742237268.250:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.271566 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:47:48.285891 kernel: audit: type=1130 audit(1742237268.272:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.289861 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:47:48.308862 kernel: iscsi: registered transport (tcp) Mar 17 18:47:48.335094 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:47:48.335154 kernel: QLogic iSCSI HBA Driver Mar 17 18:47:48.364179 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:47:48.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.367675 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:47:48.417868 kernel: raid6: avx512x4 gen() 18320 MB/s Mar 17 18:47:48.437856 kernel: raid6: avx512x4 xor() 7888 MB/s Mar 17 18:47:48.456859 kernel: raid6: avx512x2 gen() 18433 MB/s Mar 17 18:47:48.476862 kernel: raid6: avx512x2 xor() 29843 MB/s Mar 17 18:47:48.495859 kernel: raid6: avx512x1 gen() 18416 MB/s Mar 17 18:47:48.514867 kernel: raid6: avx512x1 xor() 26915 MB/s Mar 17 18:47:48.534862 kernel: raid6: avx2x4 gen() 18407 MB/s Mar 17 18:47:48.553856 kernel: raid6: avx2x4 xor() 6958 MB/s Mar 17 18:47:48.572868 kernel: raid6: avx2x2 gen() 18320 MB/s Mar 17 18:47:48.593859 kernel: raid6: avx2x2 xor() 22249 MB/s Mar 17 18:47:48.613857 kernel: raid6: avx2x1 gen() 13624 MB/s Mar 17 18:47:48.633856 kernel: raid6: avx2x1 xor() 19456 MB/s Mar 17 18:47:48.654863 kernel: raid6: sse2x4 gen() 11704 MB/s Mar 17 18:47:48.674858 kernel: raid6: sse2x4 xor() 7218 MB/s Mar 17 18:47:48.694857 kernel: raid6: sse2x2 gen() 12862 MB/s Mar 17 18:47:48.715859 kernel: raid6: sse2x2 xor() 7729 MB/s Mar 17 18:47:48.735854 kernel: raid6: sse2x1 gen() 11592 MB/s Mar 17 18:47:48.760475 kernel: raid6: sse2x1 xor() 5983 MB/s Mar 17 18:47:48.760505 kernel: raid6: using algorithm avx512x2 gen() 18433 MB/s Mar 17 18:47:48.760518 kernel: raid6: .... xor() 29843 MB/s, rmw enabled Mar 17 18:47:48.763857 kernel: raid6: using avx512x2 recovery algorithm Mar 17 18:47:48.781869 kernel: xor: automatically using best checksumming function avx Mar 17 18:47:48.876873 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 18:47:48.884938 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:47:48.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.887000 audit: BPF prog-id=7 op=LOAD Mar 17 18:47:48.887000 audit: BPF prog-id=8 op=LOAD Mar 17 18:47:48.889076 systemd[1]: Starting systemd-udevd.service... Mar 17 18:47:48.905170 systemd-udevd[385]: Using default interface naming scheme 'v252'. Mar 17 18:47:48.911677 systemd[1]: Started systemd-udevd.service. Mar 17 18:47:48.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.914685 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:47:48.929478 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Mar 17 18:47:48.956091 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:47:48.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:48.961521 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:47:48.995501 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:47:49.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:49.045867 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:47:49.061865 kernel: hv_vmbus: Vmbus version:5.2 Mar 17 18:47:49.072860 kernel: hv_vmbus: registering driver hyperv_keyboard Mar 17 18:47:49.099866 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Mar 17 18:47:49.113869 kernel: hv_vmbus: registering driver hv_storvsc Mar 17 18:47:49.120862 kernel: hv_vmbus: registering driver hv_netvsc Mar 17 18:47:49.123860 kernel: scsi host1: storvsc_host_t Mar 17 18:47:49.129736 kernel: scsi host0: storvsc_host_t Mar 17 18:47:49.129931 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 18:47:49.129946 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Mar 17 18:47:49.137735 kernel: hid: raw HID events driver (C) Jiri Kosina Mar 17 18:47:49.146814 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Mar 17 18:47:49.146875 kernel: AES CTR mode by8 optimization enabled Mar 17 18:47:49.170023 kernel: hv_vmbus: registering driver hid_hyperv Mar 17 18:47:49.170067 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Mar 17 18:47:49.187176 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 17 18:47:49.187203 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Mar 17 18:47:49.187221 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Mar 17 18:47:49.187370 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Mar 17 18:47:49.200436 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Mar 17 18:47:49.218369 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Mar 17 18:47:49.218543 kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 17 18:47:49.218695 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Mar 17 18:47:49.218886 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Mar 17 18:47:49.219050 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:47:49.219076 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 17 18:47:49.253672 kernel: hv_netvsc 7c1e5237-de66-7c1e-5237-de667c1e5237 eth0: VF slot 1 added Mar 17 18:47:49.265797 kernel: hv_vmbus: registering driver hv_pci Mar 17 18:47:49.265834 kernel: hv_pci 3cca8e8f-d130-4c51-8176-7ab5c111b078: PCI VMBus probing: Using version 0x10004 Mar 17 18:47:49.343372 kernel: hv_pci 3cca8e8f-d130-4c51-8176-7ab5c111b078: PCI host bridge to bus d130:00 Mar 17 18:47:49.343539 kernel: pci_bus d130:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Mar 17 18:47:49.343711 kernel: pci_bus d130:00: No busn resource found for root bus, will use [bus 00-ff] Mar 17 18:47:49.343872 kernel: pci d130:00:02.0: [15b3:1016] type 00 class 0x020000 Mar 17 18:47:49.344042 kernel: pci d130:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Mar 17 18:47:49.344198 kernel: pci d130:00:02.0: enabling Extended Tags Mar 17 18:47:49.344348 kernel: pci d130:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at d130:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Mar 17 18:47:49.344499 kernel: pci_bus d130:00: busn_res: [bus 00-ff] end is updated to 00 Mar 17 18:47:49.344639 kernel: pci d130:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Mar 17 18:47:49.436875 kernel: mlx5_core d130:00:02.0: firmware version: 14.30.5000 Mar 17 18:47:49.706001 kernel: mlx5_core d130:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Mar 17 18:47:49.706180 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (432) Mar 17 18:47:49.706200 kernel: mlx5_core d130:00:02.0: Supported tc offload range - chains: 1, prios: 1 Mar 17 18:47:49.706351 kernel: mlx5_core d130:00:02.0: mlx5e_tc_post_act_init:40:(pid 233): firmware level support is missing Mar 17 18:47:49.706490 kernel: hv_netvsc 7c1e5237-de66-7c1e-5237-de667c1e5237 eth0: VF registering: eth1 Mar 17 18:47:49.706586 kernel: mlx5_core d130:00:02.0 eth1: joined to eth0 Mar 17 18:47:49.583726 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:47:49.619699 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:47:49.717865 kernel: mlx5_core d130:00:02.0 enP53552s1: renamed from eth1 Mar 17 18:47:49.774792 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:47:49.807835 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:47:49.810946 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:47:49.817677 systemd[1]: Starting disk-uuid.service... Mar 17 18:47:49.834881 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:47:49.841863 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:47:50.851649 disk-uuid[551]: The operation has completed successfully. Mar 17 18:47:50.854010 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:47:50.922329 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:47:50.922445 systemd[1]: Finished disk-uuid.service. Mar 17 18:47:50.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:50.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:50.933536 systemd[1]: Starting verity-setup.service... Mar 17 18:47:50.971310 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Mar 17 18:47:51.281437 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:47:51.288063 systemd[1]: Finished verity-setup.service. Mar 17 18:47:51.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.292325 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:47:51.364863 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:47:51.364831 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:47:51.368990 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:47:51.373018 systemd[1]: Starting ignition-setup.service... Mar 17 18:47:51.377513 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:47:51.391556 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:47:51.391590 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:47:51.391607 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:47:51.442688 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:47:51.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.447000 audit: BPF prog-id=9 op=LOAD Mar 17 18:47:51.448816 systemd[1]: Starting systemd-networkd.service... Mar 17 18:47:51.471232 systemd-networkd[789]: lo: Link UP Mar 17 18:47:51.471242 systemd-networkd[789]: lo: Gained carrier Mar 17 18:47:51.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.472144 systemd-networkd[789]: Enumeration completed Mar 17 18:47:51.472216 systemd[1]: Started systemd-networkd.service. Mar 17 18:47:51.474453 systemd-networkd[789]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:47:51.475264 systemd[1]: Reached target network.target. Mar 17 18:47:51.480964 systemd[1]: Starting iscsiuio.service... Mar 17 18:47:51.495891 systemd[1]: Started iscsiuio.service. Mar 17 18:47:51.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.500189 systemd[1]: Starting iscsid.service... Mar 17 18:47:51.505918 iscsid[797]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:47:51.505918 iscsid[797]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:47:51.505918 iscsid[797]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:47:51.505918 iscsid[797]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:47:51.525179 iscsid[797]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:47:51.525179 iscsid[797]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:47:51.532151 systemd[1]: Started iscsid.service. Mar 17 18:47:51.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.536298 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:47:51.544425 kernel: mlx5_core d130:00:02.0 enP53552s1: Link up Mar 17 18:47:51.542190 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:47:51.552636 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:47:51.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.554727 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:47:51.558422 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:47:51.560324 systemd[1]: Reached target remote-fs.target. Mar 17 18:47:51.562908 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:47:51.573277 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:47:51.584295 kernel: hv_netvsc 7c1e5237-de66-7c1e-5237-de667c1e5237 eth0: Data path switched to VF: enP53552s1 Mar 17 18:47:51.584431 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:47:51.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.582618 systemd-networkd[789]: enP53552s1: Link UP Mar 17 18:47:51.582843 systemd-networkd[789]: eth0: Link UP Mar 17 18:47:51.583325 systemd-networkd[789]: eth0: Gained carrier Mar 17 18:47:51.591271 systemd-networkd[789]: enP53552s1: Gained carrier Mar 17 18:47:51.614919 systemd-networkd[789]: eth0: DHCPv4 address 10.200.8.46/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 18:47:51.640254 systemd[1]: Finished ignition-setup.service. Mar 17 18:47:51.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:51.645462 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:47:53.446136 systemd-networkd[789]: eth0: Gained IPv6LL Mar 17 18:47:55.026565 ignition[816]: Ignition 2.14.0 Mar 17 18:47:55.026583 ignition[816]: Stage: fetch-offline Mar 17 18:47:55.026699 ignition[816]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:55.026751 ignition[816]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:55.122357 ignition[816]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:55.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.123835 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:47:55.147530 kernel: kauditd_printk_skb: 18 callbacks suppressed Mar 17 18:47:55.147558 kernel: audit: type=1130 audit(1742237275.127:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.122557 ignition[816]: parsed url from cmdline: "" Mar 17 18:47:55.129318 systemd[1]: Starting ignition-fetch.service... Mar 17 18:47:55.122561 ignition[816]: no config URL provided Mar 17 18:47:55.122568 ignition[816]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:47:55.122576 ignition[816]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:47:55.122582 ignition[816]: failed to fetch config: resource requires networking Mar 17 18:47:55.122940 ignition[816]: Ignition finished successfully Mar 17 18:47:55.138155 ignition[822]: Ignition 2.14.0 Mar 17 18:47:55.138162 ignition[822]: Stage: fetch Mar 17 18:47:55.138289 ignition[822]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:55.138315 ignition[822]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:55.159043 ignition[822]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:55.159197 ignition[822]: parsed url from cmdline: "" Mar 17 18:47:55.159202 ignition[822]: no config URL provided Mar 17 18:47:55.159207 ignition[822]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:47:55.159215 ignition[822]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:47:55.159247 ignition[822]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Mar 17 18:47:55.264900 ignition[822]: GET result: OK Mar 17 18:47:55.265011 ignition[822]: config has been read from IMDS userdata Mar 17 18:47:55.265050 ignition[822]: parsing config with SHA512: f4ecb2707d499979654ab3935b4e061616c362ef46fc0bf2a4cfe7e140d47eee7d766b9a8ce295cfdc220ce94e01a950c4da904f13e8493369b3406ab332bb9e Mar 17 18:47:55.271677 unknown[822]: fetched base config from "system" Mar 17 18:47:55.271709 unknown[822]: fetched base config from "system" Mar 17 18:47:55.271718 unknown[822]: fetched user config from "azure" Mar 17 18:47:55.277415 ignition[822]: fetch: fetch complete Mar 17 18:47:55.277425 ignition[822]: fetch: fetch passed Mar 17 18:47:55.277477 ignition[822]: Ignition finished successfully Mar 17 18:47:55.283261 systemd[1]: Finished ignition-fetch.service. Mar 17 18:47:55.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.286522 systemd[1]: Starting ignition-kargs.service... Mar 17 18:47:55.301245 kernel: audit: type=1130 audit(1742237275.285:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.308962 ignition[828]: Ignition 2.14.0 Mar 17 18:47:55.308973 ignition[828]: Stage: kargs Mar 17 18:47:55.309099 ignition[828]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:55.309133 ignition[828]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:55.318195 ignition[828]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:55.322561 ignition[828]: kargs: kargs passed Mar 17 18:47:55.322614 ignition[828]: Ignition finished successfully Mar 17 18:47:55.326395 systemd[1]: Finished ignition-kargs.service. Mar 17 18:47:55.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.331141 systemd[1]: Starting ignition-disks.service... Mar 17 18:47:55.345852 kernel: audit: type=1130 audit(1742237275.330:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.340466 ignition[834]: Ignition 2.14.0 Mar 17 18:47:55.340473 ignition[834]: Stage: disks Mar 17 18:47:55.340623 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:55.340666 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:55.349872 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:55.376381 kernel: audit: type=1130 audit(1742237275.352:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.352504 systemd[1]: Finished ignition-disks.service. Mar 17 18:47:55.351671 ignition[834]: disks: disks passed Mar 17 18:47:55.352702 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:47:55.351739 ignition[834]: Ignition finished successfully Mar 17 18:47:55.353196 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:47:55.353579 systemd[1]: Reached target local-fs.target. Mar 17 18:47:55.354024 systemd[1]: Reached target sysinit.target. Mar 17 18:47:55.354399 systemd[1]: Reached target basic.target. Mar 17 18:47:55.355630 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:47:55.429551 systemd-fsck[842]: ROOT: clean, 623/7326000 files, 481078/7359488 blocks Mar 17 18:47:55.434363 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:47:55.463297 kernel: audit: type=1130 audit(1742237275.436:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.463329 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:47:55.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:55.437448 systemd[1]: Mounting sysroot.mount... Mar 17 18:47:55.459709 systemd[1]: Mounted sysroot.mount. Mar 17 18:47:55.467868 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:47:55.501121 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:47:55.506718 systemd[1]: Starting flatcar-metadata-hostname.service... Mar 17 18:47:55.511124 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:47:55.511164 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:47:55.519924 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:47:55.571897 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:47:55.577135 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:47:55.587869 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (853) Mar 17 18:47:55.596013 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:47:55.596049 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:47:55.596071 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:47:55.603018 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:47:55.607154 initrd-setup-root[858]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:47:55.626729 initrd-setup-root[884]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:47:55.650598 initrd-setup-root[892]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:47:55.657701 initrd-setup-root[900]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:47:56.143379 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:47:56.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.149165 systemd[1]: Starting ignition-mount.service... Mar 17 18:47:56.163569 kernel: audit: type=1130 audit(1742237276.147:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.164311 systemd[1]: Starting sysroot-boot.service... Mar 17 18:47:56.167170 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 18:47:56.167290 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 18:47:56.188469 ignition[919]: INFO : Ignition 2.14.0 Mar 17 18:47:56.190801 ignition[919]: INFO : Stage: mount Mar 17 18:47:56.192640 ignition[919]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:56.192640 ignition[919]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:56.214464 kernel: audit: type=1130 audit(1742237276.196:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.194688 systemd[1]: Finished sysroot-boot.service. Mar 17 18:47:56.218403 ignition[919]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:56.221570 ignition[919]: INFO : mount: mount passed Mar 17 18:47:56.221570 ignition[919]: INFO : Ignition finished successfully Mar 17 18:47:56.224067 systemd[1]: Finished ignition-mount.service. Mar 17 18:47:56.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.239874 kernel: audit: type=1130 audit(1742237276.226:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.884161 coreos-metadata[852]: Mar 17 18:47:56.884 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Mar 17 18:47:56.911225 coreos-metadata[852]: Mar 17 18:47:56.911 INFO Fetch successful Mar 17 18:47:56.945067 coreos-metadata[852]: Mar 17 18:47:56.944 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Mar 17 18:47:56.962899 coreos-metadata[852]: Mar 17 18:47:56.962 INFO Fetch successful Mar 17 18:47:56.981071 coreos-metadata[852]: Mar 17 18:47:56.981 INFO wrote hostname ci-3510.3.7-a-1304b8c80d to /sysroot/etc/hostname Mar 17 18:47:56.982941 systemd[1]: Finished flatcar-metadata-hostname.service. Mar 17 18:47:56.988454 systemd[1]: Starting ignition-files.service... Mar 17 18:47:56.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:56.997933 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:47:57.010526 kernel: audit: type=1130 audit(1742237276.987:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:57.015867 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (931) Mar 17 18:47:57.015903 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 18:47:57.024009 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:47:57.024035 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:47:57.031610 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:47:57.045027 ignition[950]: INFO : Ignition 2.14.0 Mar 17 18:47:57.045027 ignition[950]: INFO : Stage: files Mar 17 18:47:57.050294 ignition[950]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:57.050294 ignition[950]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:57.058953 ignition[950]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:57.084468 ignition[950]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:47:57.087793 ignition[950]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:47:57.087793 ignition[950]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:47:57.135139 ignition[950]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:47:57.139256 ignition[950]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:47:57.150788 unknown[950]: wrote ssh authorized keys file for user: core Mar 17 18:47:57.153316 ignition[950]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:47:57.157158 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 18:47:57.161907 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Mar 17 18:47:57.247257 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Mar 17 18:47:57.357605 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 18:47:57.362087 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:47:57.362087 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:47:57.370010 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Mar 17 18:47:57.373892 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Mar 17 18:47:57.377808 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 18:47:57.382610 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 18:47:57.386683 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 18:47:57.390990 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 18:47:57.395176 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:47:57.399506 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:47:57.399506 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 18:47:57.399506 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 18:47:57.415335 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 18:47:57.415335 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:47:57.424161 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem198164449" Mar 17 18:47:57.424161 ignition[950]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem198164449": device or resource busy Mar 17 18:47:57.424161 ignition[950]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem198164449", trying btrfs: device or resource busy Mar 17 18:47:57.424161 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem198164449" Mar 17 18:47:57.424161 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem198164449" Mar 17 18:47:57.424161 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem198164449" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem198164449" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1650358316" Mar 17 18:47:57.452645 ignition[950]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1650358316": device or resource busy Mar 17 18:47:57.452645 ignition[950]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1650358316", trying btrfs: device or resource busy Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1650358316" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1650358316" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1650358316" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1650358316" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 18:47:57.452645 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Mar 17 18:47:57.425211 systemd[1]: mnt-oem198164449.mount: Deactivated successfully. Mar 17 18:47:57.960240 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Mar 17 18:47:58.370373 ignition[950]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Mar 17 18:47:58.370373 ignition[950]: INFO : files: op(13): [started] processing unit "waagent.service" Mar 17 18:47:58.370373 ignition[950]: INFO : files: op(13): [finished] processing unit "waagent.service" Mar 17 18:47:58.370373 ignition[950]: INFO : files: op(14): [started] processing unit "nvidia.service" Mar 17 18:47:58.370373 ignition[950]: INFO : files: op(14): [finished] processing unit "nvidia.service" Mar 17 18:47:58.401249 kernel: audit: type=1130 audit(1742237278.381:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Mar 17 18:47:58.401333 ignition[950]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:47:58.401333 ignition[950]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:47:58.401333 ignition[950]: INFO : files: files passed Mar 17 18:47:58.401333 ignition[950]: INFO : Ignition finished successfully Mar 17 18:47:58.379106 systemd[1]: Finished ignition-files.service. Mar 17 18:47:58.383049 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:47:58.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.460067 initrd-setup-root-after-ignition[974]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:47:58.398402 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:47:58.401084 systemd[1]: Starting ignition-quench.service... Mar 17 18:47:58.449718 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:47:58.452152 systemd[1]: Reached target ignition-complete.target. Mar 17 18:47:58.455212 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:47:58.477206 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:47:58.479345 systemd[1]: Finished ignition-quench.service. Mar 17 18:47:58.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.494573 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:47:58.496819 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:47:58.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.500657 systemd[1]: Reached target initrd-fs.target. Mar 17 18:47:58.504603 systemd[1]: Reached target initrd.target. Mar 17 18:47:58.508047 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:47:58.511470 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:47:58.521958 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:47:58.526502 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:47:58.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.537236 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:47:58.541027 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:47:58.545154 systemd[1]: Stopped target timers.target. Mar 17 18:47:58.548893 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:47:58.551219 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:47:58.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.555132 systemd[1]: Stopped target initrd.target. Mar 17 18:47:58.558862 systemd[1]: Stopped target basic.target. Mar 17 18:47:58.562240 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:47:58.566294 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:47:58.570292 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:47:58.574346 systemd[1]: Stopped target remote-fs.target. Mar 17 18:47:58.578126 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:47:58.582205 systemd[1]: Stopped target sysinit.target. Mar 17 18:47:58.585855 systemd[1]: Stopped target local-fs.target. Mar 17 18:47:58.589318 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:47:58.593025 systemd[1]: Stopped target swap.target. Mar 17 18:47:58.596766 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:47:58.598996 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:47:58.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.602775 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:47:58.606666 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:47:58.608884 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:47:58.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.613189 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:47:58.615927 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:47:58.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.620450 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:47:58.622601 systemd[1]: Stopped ignition-files.service. Mar 17 18:47:58.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.626208 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Mar 17 18:47:58.628681 systemd[1]: Stopped flatcar-metadata-hostname.service. Mar 17 18:47:58.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.633743 systemd[1]: Stopping ignition-mount.service... Mar 17 18:47:58.635637 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:47:58.635778 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:47:58.639333 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:47:58.641212 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:47:58.656693 ignition[988]: INFO : Ignition 2.14.0 Mar 17 18:47:58.656693 ignition[988]: INFO : Stage: umount Mar 17 18:47:58.656693 ignition[988]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:47:58.656693 ignition[988]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:47:58.641397 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:47:58.669734 ignition[988]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:47:58.669734 ignition[988]: INFO : umount: umount passed Mar 17 18:47:58.669734 ignition[988]: INFO : Ignition finished successfully Mar 17 18:47:58.643954 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:47:58.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.644105 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:47:58.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.672496 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:47:58.672599 systemd[1]: Stopped ignition-mount.service. Mar 17 18:47:58.679661 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:47:58.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.679750 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:47:58.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.683513 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:47:58.683559 systemd[1]: Stopped ignition-disks.service. Mar 17 18:47:58.686499 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:47:58.686706 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:47:58.692510 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:47:58.692551 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:47:58.696623 systemd[1]: Stopped target network.target. Mar 17 18:47:58.698562 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:47:58.698616 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:47:58.702610 systemd[1]: Stopped target paths.target. Mar 17 18:47:58.703805 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:47:58.708914 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:47:58.712424 systemd[1]: Stopped target slices.target. Mar 17 18:47:58.714136 systemd[1]: Stopped target sockets.target. Mar 17 18:47:58.717652 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:47:58.717690 systemd[1]: Closed iscsid.socket. Mar 17 18:47:58.739037 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:47:58.739079 systemd[1]: Closed iscsiuio.socket. Mar 17 18:47:58.743801 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:47:58.743872 systemd[1]: Stopped ignition-setup.service. Mar 17 18:47:58.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.749900 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:47:58.751500 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:47:58.756509 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:47:58.759723 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:47:58.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.759841 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:47:58.759889 systemd-networkd[789]: eth0: DHCPv6 lease lost Mar 17 18:47:58.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.765917 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:47:58.766020 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:47:58.773000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:47:58.773000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:47:58.772231 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:47:58.772264 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:47:58.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.776258 systemd[1]: Stopping network-cleanup.service... Mar 17 18:47:58.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.779296 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:47:58.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.779355 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:47:58.783029 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:47:58.783081 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:47:58.786925 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:47:58.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.786976 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:47:58.791262 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:47:58.793981 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:47:58.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.799387 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:47:58.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.799566 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:47:58.804179 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:47:58.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.804217 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:47:58.808204 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:47:58.808244 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:47:58.845133 kernel: hv_netvsc 7c1e5237-de66-7c1e-5237-de667c1e5237 eth0: Data path switched from VF: enP53552s1 Mar 17 18:47:58.811932 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:47:58.811979 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:47:58.816545 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:47:58.816592 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:47:58.820341 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:47:58.820392 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:47:58.822931 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:47:58.825916 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:47:58.825972 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:47:58.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:58.830663 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:47:58.830759 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:47:58.863244 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:47:58.863342 systemd[1]: Stopped network-cleanup.service. Mar 17 18:47:59.154799 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:47:59.154988 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:47:59.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:59.161090 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:47:59.165121 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:47:59.165195 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:47:59.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:47:59.172236 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:47:59.183212 systemd[1]: Switching root. Mar 17 18:47:59.214006 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Mar 17 18:47:59.214073 iscsid[797]: iscsid shutting down. Mar 17 18:47:59.216084 systemd-journald[183]: Journal stopped Mar 17 18:48:13.692110 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:48:13.692150 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:48:13.692168 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:48:13.692180 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:48:13.692192 kernel: SELinux: policy capability open_perms=1 Mar 17 18:48:13.692203 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:48:13.692219 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:48:13.692252 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:48:13.692263 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:48:13.692273 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:48:13.692284 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:48:13.692293 kernel: kauditd_printk_skb: 40 callbacks suppressed Mar 17 18:48:13.692305 kernel: audit: type=1403 audit(1742237281.422:79): auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:48:13.692315 systemd[1]: Successfully loaded SELinux policy in 250.496ms. Mar 17 18:48:13.692332 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.589ms. Mar 17 18:48:13.692344 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:48:13.692357 systemd[1]: Detected virtualization microsoft. Mar 17 18:48:13.692368 systemd[1]: Detected architecture x86-64. Mar 17 18:48:13.692377 systemd[1]: Detected first boot. Mar 17 18:48:13.692392 systemd[1]: Hostname set to . Mar 17 18:48:13.692404 systemd[1]: Initializing machine ID from random generator. Mar 17 18:48:13.692414 kernel: audit: type=1400 audit(1742237282.146:80): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:48:13.692426 kernel: audit: type=1400 audit(1742237282.167:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:13.692437 kernel: audit: type=1400 audit(1742237282.167:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:13.692447 kernel: audit: type=1334 audit(1742237282.178:83): prog-id=10 op=LOAD Mar 17 18:48:13.692459 kernel: audit: type=1334 audit(1742237282.178:84): prog-id=10 op=UNLOAD Mar 17 18:48:13.692469 kernel: audit: type=1334 audit(1742237282.189:85): prog-id=11 op=LOAD Mar 17 18:48:13.692480 kernel: audit: type=1334 audit(1742237282.189:86): prog-id=11 op=UNLOAD Mar 17 18:48:13.692488 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:48:13.692500 kernel: audit: type=1400 audit(1742237283.633:87): avc: denied { associate } for pid=1022 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:48:13.692511 kernel: audit: type=1300 audit(1742237283.633:87): arch=c000003e syscall=188 success=yes exit=0 a0=c00018c23c a1=c000180300 a2=c000184780 a3=32 items=0 ppid=1005 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:13.692522 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:48:13.692536 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:48:13.692547 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:48:13.692559 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:48:13.692568 kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 17 18:48:13.692579 kernel: audit: type=1334 audit(1742237293.165:89): prog-id=12 op=LOAD Mar 17 18:48:13.692590 kernel: audit: type=1334 audit(1742237293.165:90): prog-id=3 op=UNLOAD Mar 17 18:48:13.692599 kernel: audit: type=1334 audit(1742237293.170:91): prog-id=13 op=LOAD Mar 17 18:48:13.692611 kernel: audit: type=1334 audit(1742237293.174:92): prog-id=14 op=LOAD Mar 17 18:48:13.692622 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:48:13.692635 kernel: audit: type=1334 audit(1742237293.174:93): prog-id=4 op=UNLOAD Mar 17 18:48:13.692644 kernel: audit: type=1334 audit(1742237293.174:94): prog-id=5 op=UNLOAD Mar 17 18:48:13.692655 kernel: audit: type=1131 audit(1742237293.176:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.692668 systemd[1]: Stopped iscsiuio.service. Mar 17 18:48:13.692678 kernel: audit: type=1334 audit(1742237293.216:96): prog-id=12 op=UNLOAD Mar 17 18:48:13.692689 kernel: audit: type=1131 audit(1742237293.222:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.692703 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:48:13.692714 systemd[1]: Stopped iscsid.service. Mar 17 18:48:13.692726 kernel: audit: type=1131 audit(1742237293.243:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.692737 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:48:13.692748 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:48:13.692758 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:48:13.692770 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:48:13.692782 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:48:13.692794 systemd[1]: Created slice system-getty.slice. Mar 17 18:48:13.692806 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:48:13.692818 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:48:13.692828 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:48:13.692840 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:48:13.692877 systemd[1]: Created slice user.slice. Mar 17 18:48:13.692889 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:48:13.692899 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:48:13.692910 systemd[1]: Set up automount boot.automount. Mar 17 18:48:13.692923 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:48:13.692936 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:48:13.692945 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:48:13.692957 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:48:13.692969 systemd[1]: Reached target integritysetup.target. Mar 17 18:48:13.692979 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:48:13.692991 systemd[1]: Reached target remote-fs.target. Mar 17 18:48:13.693003 systemd[1]: Reached target slices.target. Mar 17 18:48:13.693016 systemd[1]: Reached target swap.target. Mar 17 18:48:13.693028 systemd[1]: Reached target torcx.target. Mar 17 18:48:13.693039 systemd[1]: Reached target veritysetup.target. Mar 17 18:48:13.693051 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:48:13.693065 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:48:13.693076 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:48:13.693087 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:48:13.693100 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:48:13.693111 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:48:13.693122 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:48:13.693133 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:48:13.693144 systemd[1]: Mounting media.mount... Mar 17 18:48:13.693154 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:13.693166 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:48:13.693179 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:48:13.693189 systemd[1]: Mounting tmp.mount... Mar 17 18:48:13.693201 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:48:13.693213 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:13.693224 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:48:13.693234 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:48:13.693246 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:13.693258 systemd[1]: Starting modprobe@drm.service... Mar 17 18:48:13.693270 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:13.693283 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:48:13.693294 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:13.693306 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:48:13.693317 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:48:13.693329 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:48:13.693342 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:48:13.693352 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:48:13.693364 systemd[1]: Stopped systemd-journald.service. Mar 17 18:48:13.693379 systemd[1]: Starting systemd-journald.service... Mar 17 18:48:13.693389 kernel: loop: module loaded Mar 17 18:48:13.693401 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:48:13.693413 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:48:13.693423 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:48:13.693436 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:48:13.693447 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:48:13.693458 systemd[1]: Stopped verity-setup.service. Mar 17 18:48:13.693470 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:13.693485 kernel: fuse: init (API version 7.34) Mar 17 18:48:13.693494 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:48:13.693506 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:48:13.693517 systemd[1]: Mounted media.mount. Mar 17 18:48:13.693529 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:48:13.693539 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:48:13.693559 systemd[1]: Mounted tmp.mount. Mar 17 18:48:13.693570 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:48:13.693586 systemd-journald[1103]: Journal started Mar 17 18:48:13.693637 systemd-journald[1103]: Runtime Journal (/run/log/journal/4fc33e5b781f488882044ea0f79476c0) is 8.0M, max 159.0M, 151.0M free. Mar 17 18:48:01.422000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:48:02.146000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:48:02.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:02.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:48:02.178000 audit: BPF prog-id=10 op=LOAD Mar 17 18:48:02.178000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:48:02.189000 audit: BPF prog-id=11 op=LOAD Mar 17 18:48:02.189000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:48:03.633000 audit[1022]: AVC avc: denied { associate } for pid=1022 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:48:03.633000 audit[1022]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018c23c a1=c000180300 a2=c000184780 a3=32 items=0 ppid=1005 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:03.633000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:48:03.640000 audit[1022]: AVC avc: denied { associate } for pid=1022 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:48:03.640000 audit[1022]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018c315 a2=1ed a3=0 items=2 ppid=1005 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:03.640000 audit: CWD cwd="/" Mar 17 18:48:03.640000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:03.640000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:03.640000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:48:13.165000 audit: BPF prog-id=12 op=LOAD Mar 17 18:48:13.165000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:48:13.170000 audit: BPF prog-id=13 op=LOAD Mar 17 18:48:13.174000 audit: BPF prog-id=14 op=LOAD Mar 17 18:48:13.174000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:48:13.174000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:48:13.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.216000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:48:13.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.572000 audit: BPF prog-id=15 op=LOAD Mar 17 18:48:13.573000 audit: BPF prog-id=16 op=LOAD Mar 17 18:48:13.573000 audit: BPF prog-id=17 op=LOAD Mar 17 18:48:13.573000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:48:13.573000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:48:13.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.686000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:48:13.686000 audit[1103]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe02ab9640 a2=4000 a3=7ffe02ab96dc items=0 ppid=1 pid=1103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:13.686000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:48:03.584934 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:48:13.164494 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:48:03.600911 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:48:13.164505 systemd[1]: Unnecessary job was removed for dev-sda6.device. Mar 17 18:48:03.600940 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:48:13.176992 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:48:03.600984 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:48:03.600995 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:48:13.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:03.601050 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:48:03.601065 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:48:03.601306 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:48:03.601365 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:48:03.601388 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:48:03.616574 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:48:03.616660 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:48:03.616700 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:48:03.616715 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:48:03.616732 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:48:03.616745 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:48:11.724685 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:11.724968 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:11.725089 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:11.725292 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:48:11.725345 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:48:11.725408 /usr/lib/systemd/system-generators/torcx-generator[1022]: time="2025-03-17T18:48:11Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:48:13.700863 systemd[1]: Started systemd-journald.service. Mar 17 18:48:13.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.703340 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:48:13.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.705691 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:48:13.705830 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:48:13.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.708014 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:13.708152 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:13.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.710602 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:48:13.710737 systemd[1]: Finished modprobe@drm.service. Mar 17 18:48:13.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.712932 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:13.713070 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:13.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.715576 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:48:13.715710 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:48:13.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.718046 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:13.718181 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:13.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.720674 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:48:13.723439 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:48:13.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.726184 systemd[1]: Reached target network-pre.target. Mar 17 18:48:13.729340 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:48:13.732843 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:48:13.735048 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:48:13.751650 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:48:13.754619 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:48:13.756890 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:13.758033 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:48:13.760880 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:13.762402 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:48:13.769098 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:48:13.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.772142 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:48:13.774221 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:48:13.777411 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:48:13.806482 systemd-journald[1103]: Time spent on flushing to /var/log/journal/4fc33e5b781f488882044ea0f79476c0 is 16.636ms for 1143 entries. Mar 17 18:48:13.806482 systemd-journald[1103]: System Journal (/var/log/journal/4fc33e5b781f488882044ea0f79476c0) is 8.0M, max 2.6G, 2.6G free. Mar 17 18:48:13.871667 systemd-journald[1103]: Received client request to flush runtime journal. Mar 17 18:48:13.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.822981 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:48:13.872062 udevadm[1145]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Mar 17 18:48:13.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:13.825411 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:48:13.831251 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:48:13.834729 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:48:13.872734 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:48:13.927710 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:48:13.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:14.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:14.435874 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:48:14.923304 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:48:14.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:14.925000 audit: BPF prog-id=18 op=LOAD Mar 17 18:48:14.925000 audit: BPF prog-id=19 op=LOAD Mar 17 18:48:14.925000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:48:14.925000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:48:14.927131 systemd[1]: Starting systemd-udevd.service... Mar 17 18:48:14.943984 systemd-udevd[1148]: Using default interface naming scheme 'v252'. Mar 17 18:48:15.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:15.234000 audit: BPF prog-id=20 op=LOAD Mar 17 18:48:15.231382 systemd[1]: Started systemd-udevd.service. Mar 17 18:48:15.236759 systemd[1]: Starting systemd-networkd.service... Mar 17 18:48:15.273841 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 18:48:15.339828 kernel: hv_vmbus: registering driver hyperv_fb Mar 17 18:48:15.332000 audit: BPF prog-id=21 op=LOAD Mar 17 18:48:15.332000 audit: BPF prog-id=22 op=LOAD Mar 17 18:48:15.332000 audit: BPF prog-id=23 op=LOAD Mar 17 18:48:15.337908 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:48:15.342000 audit[1149]: AVC avc: denied { confidentiality } for pid=1149 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:48:15.354867 kernel: hv_vmbus: registering driver hv_balloon Mar 17 18:48:15.360872 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Mar 17 18:48:15.377803 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Mar 17 18:48:15.377871 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Mar 17 18:48:15.385029 kernel: Console: switching to colour dummy device 80x25 Mar 17 18:48:15.394881 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:48:15.394952 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 18:48:15.342000 audit[1149]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5648b8e432e0 a1=f884 a2=7f7d2f7edbc5 a3=5 items=12 ppid=1148 pid=1149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:15.342000 audit: CWD cwd="/" Mar 17 18:48:15.342000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=1 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=2 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=3 name=(null) inode=14299 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=4 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=5 name=(null) inode=14300 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=6 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=7 name=(null) inode=14301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=8 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=9 name=(null) inode=14302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=10 name=(null) inode=14298 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PATH item=11 name=(null) inode=14303 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:48:15.342000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:48:15.400249 kernel: hv_utils: Registering HyperV Utility Driver Mar 17 18:48:15.400299 kernel: hv_vmbus: registering driver hv_utils Mar 17 18:48:15.400414 systemd[1]: Started systemd-userdbd.service. Mar 17 18:48:15.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:15.415953 kernel: hv_utils: Heartbeat IC version 3.0 Mar 17 18:48:15.416006 kernel: hv_utils: Shutdown IC version 3.2 Mar 17 18:48:15.416025 kernel: hv_utils: TimeSync IC version 4.0 Mar 17 18:48:15.856238 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:48:15.861897 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Mar 17 18:48:15.922382 systemd-networkd[1159]: lo: Link UP Mar 17 18:48:15.922393 systemd-networkd[1159]: lo: Gained carrier Mar 17 18:48:15.922958 systemd-networkd[1159]: Enumeration completed Mar 17 18:48:15.923093 systemd[1]: Started systemd-networkd.service. Mar 17 18:48:15.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:15.926732 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:48:15.935366 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:48:15.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:15.938864 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:48:15.953705 systemd-networkd[1159]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:48:16.006032 kernel: mlx5_core d130:00:02.0 enP53552s1: Link up Mar 17 18:48:16.030027 kernel: hv_netvsc 7c1e5237-de66-7c1e-5237-de667c1e5237 eth0: Data path switched to VF: enP53552s1 Mar 17 18:48:16.030829 systemd-networkd[1159]: enP53552s1: Link UP Mar 17 18:48:16.030971 systemd-networkd[1159]: eth0: Link UP Mar 17 18:48:16.030976 systemd-networkd[1159]: eth0: Gained carrier Mar 17 18:48:16.034335 systemd-networkd[1159]: enP53552s1: Gained carrier Mar 17 18:48:16.063119 systemd-networkd[1159]: eth0: DHCPv4 address 10.200.8.46/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 18:48:16.305076 lvm[1225]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:48:16.335062 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:48:16.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:16.337746 systemd[1]: Reached target cryptsetup.target. Mar 17 18:48:16.341198 systemd[1]: Starting lvm2-activation.service... Mar 17 18:48:16.346112 lvm[1226]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:48:16.363879 systemd[1]: Finished lvm2-activation.service. Mar 17 18:48:16.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:16.366449 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:48:16.368590 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:48:16.368625 systemd[1]: Reached target local-fs.target. Mar 17 18:48:16.370607 systemd[1]: Reached target machines.target. Mar 17 18:48:16.373604 systemd[1]: Starting ldconfig.service... Mar 17 18:48:16.375888 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:16.375990 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:16.377154 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:48:16.380302 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:48:16.383729 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:48:16.387201 systemd[1]: Starting systemd-sysext.service... Mar 17 18:48:16.848619 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1228 (bootctl) Mar 17 18:48:16.850688 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:48:16.869546 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:48:16.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:16.915542 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:48:16.986287 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:48:16.986584 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:48:17.018027 kernel: loop0: detected capacity change from 0 to 210664 Mar 17 18:48:17.023087 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:48:17.023811 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:48:17.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.056016 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:48:17.072011 kernel: loop1: detected capacity change from 0 to 210664 Mar 17 18:48:17.076123 (sd-sysext)[1240]: Using extensions 'kubernetes'. Mar 17 18:48:17.076527 (sd-sysext)[1240]: Merged extensions into '/usr'. Mar 17 18:48:17.091894 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.093295 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:48:17.096005 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.097686 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:17.101043 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:17.104233 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:17.106236 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.106422 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:17.106620 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.109237 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:48:17.111666 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:17.111812 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:17.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.114371 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:17.114512 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:17.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.117458 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:17.117607 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:17.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.120248 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:17.120394 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.121689 systemd[1]: Finished systemd-sysext.service. Mar 17 18:48:17.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.125251 systemd[1]: Starting ensure-sysext.service... Mar 17 18:48:17.128583 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:48:17.135558 systemd[1]: Reloading. Mar 17 18:48:17.193272 /usr/lib/systemd/system-generators/torcx-generator[1266]: time="2025-03-17T18:48:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:48:17.193692 /usr/lib/systemd/system-generators/torcx-generator[1266]: time="2025-03-17T18:48:17Z" level=info msg="torcx already run" Mar 17 18:48:17.288295 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:48:17.288314 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:48:17.304630 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:48:17.314739 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:48:17.369000 audit: BPF prog-id=24 op=LOAD Mar 17 18:48:17.369000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:48:17.370000 audit: BPF prog-id=25 op=LOAD Mar 17 18:48:17.370000 audit: BPF prog-id=26 op=LOAD Mar 17 18:48:17.370000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:48:17.370000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:48:17.373000 audit: BPF prog-id=27 op=LOAD Mar 17 18:48:17.373000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:48:17.373000 audit: BPF prog-id=28 op=LOAD Mar 17 18:48:17.373000 audit: BPF prog-id=29 op=LOAD Mar 17 18:48:17.373000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:48:17.373000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:48:17.374000 audit: BPF prog-id=30 op=LOAD Mar 17 18:48:17.374000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:48:17.374000 audit: BPF prog-id=31 op=LOAD Mar 17 18:48:17.374000 audit: BPF prog-id=32 op=LOAD Mar 17 18:48:17.374000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:48:17.374000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:48:17.388199 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.388551 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.389906 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:48:17.392345 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:48:17.395331 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:17.395462 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.395601 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:17.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.395748 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.396894 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:17.397093 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:17.402843 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:48:17.402982 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:48:17.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.403494 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:48:17.403597 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:48:17.404040 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.404317 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.407215 systemd[1]: Starting modprobe@drm.service... Mar 17 18:48:17.408500 systemd[1]: Starting modprobe@loop.service... Mar 17 18:48:17.408898 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.409086 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:17.409233 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:48:17.409380 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 18:48:17.412390 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:48:17.412553 systemd[1]: Finished modprobe@loop.service. Mar 17 18:48:17.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.413216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:48:17.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.414693 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:48:17.414833 systemd[1]: Finished modprobe@drm.service. Mar 17 18:48:17.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.416958 systemd[1]: Finished ensure-sysext.service. Mar 17 18:48:17.428850 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:48:17.514250 systemd-networkd[1159]: eth0: Gained IPv6LL Mar 17 18:48:17.517321 systemd-tmpfiles[1247]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:48:17.520277 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:48:17.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.653741 systemd-fsck[1235]: fsck.fat 4.2 (2021-01-31) Mar 17 18:48:17.653741 systemd-fsck[1235]: /dev/sda1: 789 files, 119299/258078 clusters Mar 17 18:48:17.655786 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:48:17.660862 systemd[1]: Mounting boot.mount... Mar 17 18:48:17.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:17.673410 systemd[1]: Mounted boot.mount. Mar 17 18:48:17.686277 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:48:17.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.498041 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:48:19.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.502243 systemd[1]: Starting audit-rules.service... Mar 17 18:48:19.503444 kernel: kauditd_printk_skb: 110 callbacks suppressed Mar 17 18:48:19.503493 kernel: audit: type=1130 audit(1742237299.500:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.516814 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:48:19.520393 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:48:19.523000 audit: BPF prog-id=33 op=LOAD Mar 17 18:48:19.525753 systemd[1]: Starting systemd-resolved.service... Mar 17 18:48:19.531961 kernel: audit: type=1334 audit(1742237299.523:193): prog-id=33 op=LOAD Mar 17 18:48:19.530000 audit: BPF prog-id=34 op=LOAD Mar 17 18:48:19.532741 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:48:19.537326 kernel: audit: type=1334 audit(1742237299.530:194): prog-id=34 op=LOAD Mar 17 18:48:19.538356 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:48:19.584211 kernel: audit: type=1127 audit(1742237299.570:195): pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.570000 audit[1345]: SYSTEM_BOOT pid=1345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.572545 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:48:19.598023 kernel: audit: type=1130 audit(1742237299.583:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.602256 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:48:19.604696 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:48:19.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.620013 kernel: audit: type=1130 audit(1742237299.604:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.694862 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:48:19.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.697559 systemd[1]: Reached target time-set.target. Mar 17 18:48:19.712701 kernel: audit: type=1130 audit(1742237299.697:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.744564 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:48:19.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.761024 kernel: audit: type=1130 audit(1742237299.747:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:48:19.771442 systemd-resolved[1342]: Positive Trust Anchors: Mar 17 18:48:19.771461 systemd-resolved[1342]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:48:19.771503 systemd-resolved[1342]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:48:19.829740 systemd-resolved[1342]: Using system hostname 'ci-3510.3.7-a-1304b8c80d'. Mar 17 18:48:19.831111 augenrules[1360]: No rules Mar 17 18:48:19.830000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:48:19.832136 systemd[1]: Started systemd-resolved.service. Mar 17 18:48:19.830000 audit[1360]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb1e74430 a2=420 a3=0 items=0 ppid=1339 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:19.856583 kernel: audit: type=1305 audit(1742237299.830:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:48:19.856627 kernel: audit: type=1300 audit(1742237299.830:200): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb1e74430 a2=420 a3=0 items=0 ppid=1339 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:48:19.856413 systemd[1]: Finished audit-rules.service. Mar 17 18:48:19.830000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:48:19.858874 systemd[1]: Reached target network.target. Mar 17 18:48:19.860790 systemd[1]: Reached target network-online.target. Mar 17 18:48:19.862709 systemd[1]: Reached target nss-lookup.target. Mar 17 18:48:19.991801 systemd-timesyncd[1344]: Contacted time server 193.1.8.106:123 (0.flatcar.pool.ntp.org). Mar 17 18:48:19.991879 systemd-timesyncd[1344]: Initial clock synchronization to Mon 2025-03-17 18:48:19.991577 UTC. Mar 17 18:48:24.819333 ldconfig[1227]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:48:24.827191 systemd[1]: Finished ldconfig.service. Mar 17 18:48:24.831578 systemd[1]: Starting systemd-update-done.service... Mar 17 18:48:24.838446 systemd[1]: Finished systemd-update-done.service. Mar 17 18:48:24.840704 systemd[1]: Reached target sysinit.target. Mar 17 18:48:24.842639 systemd[1]: Started motdgen.path. Mar 17 18:48:24.844257 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:48:24.847157 systemd[1]: Started logrotate.timer. Mar 17 18:48:24.848889 systemd[1]: Started mdadm.timer. Mar 17 18:48:24.850455 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:48:24.852435 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:48:24.852484 systemd[1]: Reached target paths.target. Mar 17 18:48:24.854192 systemd[1]: Reached target timers.target. Mar 17 18:48:24.856280 systemd[1]: Listening on dbus.socket. Mar 17 18:48:24.858912 systemd[1]: Starting docker.socket... Mar 17 18:48:24.877392 systemd[1]: Listening on sshd.socket. Mar 17 18:48:24.879505 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:24.880029 systemd[1]: Listening on docker.socket. Mar 17 18:48:24.882179 systemd[1]: Reached target sockets.target. Mar 17 18:48:24.884260 systemd[1]: Reached target basic.target. Mar 17 18:48:24.886317 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:48:24.886369 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:48:24.887380 systemd[1]: Starting containerd.service... Mar 17 18:48:24.890301 systemd[1]: Starting dbus.service... Mar 17 18:48:24.893138 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:48:24.896141 systemd[1]: Starting extend-filesystems.service... Mar 17 18:48:24.898092 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:48:24.899602 systemd[1]: Starting kubelet.service... Mar 17 18:48:24.902465 systemd[1]: Starting motdgen.service... Mar 17 18:48:24.905565 systemd[1]: Started nvidia.service. Mar 17 18:48:24.908951 systemd[1]: Starting prepare-helm.service... Mar 17 18:48:24.911989 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:48:24.915378 systemd[1]: Starting sshd-keygen.service... Mar 17 18:48:24.920197 systemd[1]: Starting systemd-logind.service... Mar 17 18:48:24.922358 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:48:24.922449 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 18:48:24.922945 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:48:24.923804 systemd[1]: Starting update-engine.service... Mar 17 18:48:24.927720 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:48:24.937360 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:48:24.937622 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:48:24.989580 jq[1370]: false Mar 17 18:48:24.989965 jq[1384]: true Mar 17 18:48:24.990595 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:48:24.990787 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:48:25.012224 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:48:25.012453 systemd[1]: Finished motdgen.service. Mar 17 18:48:25.017381 jq[1392]: true Mar 17 18:48:25.023149 extend-filesystems[1371]: Found loop1 Mar 17 18:48:25.026295 extend-filesystems[1371]: Found sda Mar 17 18:48:25.026295 extend-filesystems[1371]: Found sda1 Mar 17 18:48:25.032632 extend-filesystems[1371]: Found sda2 Mar 17 18:48:25.034737 extend-filesystems[1371]: Found sda3 Mar 17 18:48:25.034737 extend-filesystems[1371]: Found usr Mar 17 18:48:25.034737 extend-filesystems[1371]: Found sda4 Mar 17 18:48:25.034737 extend-filesystems[1371]: Found sda6 Mar 17 18:48:25.034737 extend-filesystems[1371]: Found sda7 Mar 17 18:48:25.034737 extend-filesystems[1371]: Found sda9 Mar 17 18:48:25.034737 extend-filesystems[1371]: Checking size of /dev/sda9 Mar 17 18:48:25.055370 systemd-logind[1381]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 18:48:25.064894 systemd-logind[1381]: New seat seat0. Mar 17 18:48:25.070836 tar[1387]: linux-amd64/helm Mar 17 18:48:25.113500 env[1393]: time="2025-03-17T18:48:25.113222572Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:48:25.130316 extend-filesystems[1371]: Old size kept for /dev/sda9 Mar 17 18:48:25.142922 extend-filesystems[1371]: Found sr0 Mar 17 18:48:25.132921 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:48:25.133100 systemd[1]: Finished extend-filesystems.service. Mar 17 18:48:25.231401 dbus-daemon[1369]: [system] SELinux support is enabled Mar 17 18:48:25.231579 systemd[1]: Started dbus.service. Mar 17 18:48:25.236147 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:48:25.236184 systemd[1]: Reached target system-config.target. Mar 17 18:48:25.238614 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:48:25.238639 systemd[1]: Reached target user-config.target. Mar 17 18:48:25.244560 systemd[1]: Started systemd-logind.service. Mar 17 18:48:25.247453 dbus-daemon[1369]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 17 18:48:25.251509 bash[1422]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:48:25.251877 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:48:25.286118 env[1393]: time="2025-03-17T18:48:25.286067897Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:48:25.295805 env[1393]: time="2025-03-17T18:48:25.295766242Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.317700 env[1393]: time="2025-03-17T18:48:25.317613719Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:25.317871 env[1393]: time="2025-03-17T18:48:25.317850617Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.318324 env[1393]: time="2025-03-17T18:48:25.318292915Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:25.318449 env[1393]: time="2025-03-17T18:48:25.318428114Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.318546 env[1393]: time="2025-03-17T18:48:25.318527714Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:48:25.318640 env[1393]: time="2025-03-17T18:48:25.318625513Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.318844 env[1393]: time="2025-03-17T18:48:25.318823312Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.319280 env[1393]: time="2025-03-17T18:48:25.319260309Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:48:25.319614 env[1393]: time="2025-03-17T18:48:25.319588908Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:48:25.319717 env[1393]: time="2025-03-17T18:48:25.319701207Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:48:25.319878 env[1393]: time="2025-03-17T18:48:25.319859706Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:48:25.319979 env[1393]: time="2025-03-17T18:48:25.319964105Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:48:25.331974 env[1393]: time="2025-03-17T18:48:25.331906138Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:48:25.332108 env[1393]: time="2025-03-17T18:48:25.332089937Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:48:25.332205 env[1393]: time="2025-03-17T18:48:25.332191536Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:48:25.332314 env[1393]: time="2025-03-17T18:48:25.332299036Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332457 env[1393]: time="2025-03-17T18:48:25.332429435Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332541 env[1393]: time="2025-03-17T18:48:25.332516535Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332618 env[1393]: time="2025-03-17T18:48:25.332594334Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332698 env[1393]: time="2025-03-17T18:48:25.332686034Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332776 env[1393]: time="2025-03-17T18:48:25.332764133Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332908 env[1393]: time="2025-03-17T18:48:25.332895032Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.332990 env[1393]: time="2025-03-17T18:48:25.332977132Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.333088 env[1393]: time="2025-03-17T18:48:25.333072931Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:48:25.333308 env[1393]: time="2025-03-17T18:48:25.333281530Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:48:25.333521 env[1393]: time="2025-03-17T18:48:25.333502629Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:48:25.334033 env[1393]: time="2025-03-17T18:48:25.334009826Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:48:25.334180 env[1393]: time="2025-03-17T18:48:25.334162325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334283 env[1393]: time="2025-03-17T18:48:25.334266425Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:48:25.334452 env[1393]: time="2025-03-17T18:48:25.334414524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334620 env[1393]: time="2025-03-17T18:48:25.334587323Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334721 env[1393]: time="2025-03-17T18:48:25.334704322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334809 env[1393]: time="2025-03-17T18:48:25.334793022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334888 env[1393]: time="2025-03-17T18:48:25.334875021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.334972 env[1393]: time="2025-03-17T18:48:25.334959221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335072 env[1393]: time="2025-03-17T18:48:25.335055420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335169 env[1393]: time="2025-03-17T18:48:25.335150620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335264 env[1393]: time="2025-03-17T18:48:25.335249319Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:48:25.335536 env[1393]: time="2025-03-17T18:48:25.335512818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335681 env[1393]: time="2025-03-17T18:48:25.335659717Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335785 env[1393]: time="2025-03-17T18:48:25.335769516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.335878 env[1393]: time="2025-03-17T18:48:25.335863716Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:48:25.335966 env[1393]: time="2025-03-17T18:48:25.335949815Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:48:25.336049 env[1393]: time="2025-03-17T18:48:25.336036315Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:48:25.336144 env[1393]: time="2025-03-17T18:48:25.336129814Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:48:25.336246 env[1393]: time="2025-03-17T18:48:25.336232814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:48:25.336662 env[1393]: time="2025-03-17T18:48:25.336590512Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.338879699Z" level=info msg="Connect containerd service" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.338947698Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.339684294Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.339958793Z" level=info msg="Start subscribing containerd event" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340030492Z" level=info msg="Start recovering state" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340114492Z" level=info msg="Start event monitor" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340127092Z" level=info msg="Start snapshots syncer" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340155192Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340165991Z" level=info msg="Start streaming server" Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340417490Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340482590Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:48:25.371533 env[1393]: time="2025-03-17T18:48:25.340567689Z" level=info msg="containerd successfully booted in 0.228181s" Mar 17 18:48:25.340643 systemd[1]: Started containerd.service. Mar 17 18:48:25.408862 systemd[1]: nvidia.service: Deactivated successfully. Mar 17 18:48:25.880621 update_engine[1382]: I0317 18:48:25.880308 1382 main.cc:92] Flatcar Update Engine starting Mar 17 18:48:25.948958 systemd[1]: Started update-engine.service. Mar 17 18:48:25.954329 update_engine[1382]: I0317 18:48:25.949075 1382 update_check_scheduler.cc:74] Next update check in 4m3s Mar 17 18:48:25.954406 systemd[1]: Started locksmithd.service. Mar 17 18:48:26.138746 tar[1387]: linux-amd64/LICENSE Mar 17 18:48:26.138746 tar[1387]: linux-amd64/README.md Mar 17 18:48:26.145524 systemd[1]: Finished prepare-helm.service. Mar 17 18:48:26.428613 systemd[1]: Started kubelet.service. Mar 17 18:48:27.146292 kubelet[1475]: E0317 18:48:27.146245 1475 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:27.148308 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:27.148466 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:48:27.148741 systemd[1]: kubelet.service: Consumed 1.120s CPU time. Mar 17 18:48:27.401491 sshd_keygen[1391]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:48:27.421493 systemd[1]: Finished sshd-keygen.service. Mar 17 18:48:27.425422 systemd[1]: Starting issuegen.service... Mar 17 18:48:27.428836 systemd[1]: Started waagent.service. Mar 17 18:48:27.433327 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:48:27.433533 systemd[1]: Finished issuegen.service. Mar 17 18:48:27.437260 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:48:27.465508 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:48:27.469549 systemd[1]: Started getty@tty1.service. Mar 17 18:48:27.473159 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 18:48:27.475613 systemd[1]: Reached target getty.target. Mar 17 18:48:27.477518 systemd[1]: Reached target multi-user.target. Mar 17 18:48:27.480886 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:48:27.490037 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:48:27.490218 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:48:27.493011 systemd[1]: Startup finished in 855ms (firmware) + 29.205s (loader) + 875ms (kernel) + 13.246s (initrd) + 26.336s (userspace) = 1min 10.518s. Mar 17 18:48:27.646066 locksmithd[1471]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:48:27.925939 login[1499]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 18:48:27.927481 login[1500]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 18:48:27.987666 systemd[1]: Created slice user-500.slice. Mar 17 18:48:27.989128 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:48:27.992478 systemd-logind[1381]: New session 2 of user core. Mar 17 18:48:27.997262 systemd-logind[1381]: New session 1 of user core. Mar 17 18:48:28.001720 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:48:28.003155 systemd[1]: Starting user@500.service... Mar 17 18:48:28.051609 (systemd)[1503]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:48:28.166176 systemd[1503]: Queued start job for default target default.target. Mar 17 18:48:28.166749 systemd[1503]: Reached target paths.target. Mar 17 18:48:28.166780 systemd[1503]: Reached target sockets.target. Mar 17 18:48:28.166797 systemd[1503]: Reached target timers.target. Mar 17 18:48:28.166813 systemd[1503]: Reached target basic.target. Mar 17 18:48:28.166929 systemd[1]: Started user@500.service. Mar 17 18:48:28.168158 systemd[1]: Started session-1.scope. Mar 17 18:48:28.168952 systemd[1]: Started session-2.scope. Mar 17 18:48:28.169846 systemd[1503]: Reached target default.target. Mar 17 18:48:28.170061 systemd[1503]: Startup finished in 111ms. Mar 17 18:48:33.936303 waagent[1494]: 2025-03-17T18:48:33.936180Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Mar 17 18:48:33.950075 waagent[1494]: 2025-03-17T18:48:33.937575Z INFO Daemon Daemon OS: flatcar 3510.3.7 Mar 17 18:48:33.950075 waagent[1494]: 2025-03-17T18:48:33.938632Z INFO Daemon Daemon Python: 3.9.16 Mar 17 18:48:33.950075 waagent[1494]: 2025-03-17T18:48:33.939884Z INFO Daemon Daemon Run daemon Mar 17 18:48:33.950075 waagent[1494]: 2025-03-17T18:48:33.941317Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' Mar 17 18:48:33.956956 waagent[1494]: 2025-03-17T18:48:33.956843Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.963867Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.964409Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.965806Z INFO Daemon Daemon Using waagent for provisioning Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.967331Z INFO Daemon Daemon Activate resource disk Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.967989Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.975874Z INFO Daemon Daemon Found device: None Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.976849Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.977796Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.979402Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.980292Z INFO Daemon Daemon Running default provisioning handler Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.989625Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.992091Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.993168Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 18:48:34.004394 waagent[1494]: 2025-03-17T18:48:33.994556Z INFO Daemon Daemon Copying ovf-env.xml Mar 17 18:48:34.052796 waagent[1494]: 2025-03-17T18:48:34.052645Z INFO Daemon Daemon Successfully mounted dvd Mar 17 18:48:34.225607 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Mar 17 18:48:34.250150 waagent[1494]: 2025-03-17T18:48:34.249977Z INFO Daemon Daemon Detect protocol endpoint Mar 17 18:48:34.264469 waagent[1494]: 2025-03-17T18:48:34.250622Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 18:48:34.264469 waagent[1494]: 2025-03-17T18:48:34.252005Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Mar 17 18:48:34.264469 waagent[1494]: 2025-03-17T18:48:34.253014Z INFO Daemon Daemon Test for route to 168.63.129.16 Mar 17 18:48:34.264469 waagent[1494]: 2025-03-17T18:48:34.254267Z INFO Daemon Daemon Route to 168.63.129.16 exists Mar 17 18:48:34.264469 waagent[1494]: 2025-03-17T18:48:34.254862Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Mar 17 18:48:34.395854 waagent[1494]: 2025-03-17T18:48:34.395761Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Mar 17 18:48:34.400297 waagent[1494]: 2025-03-17T18:48:34.400250Z INFO Daemon Daemon Wire protocol version:2012-11-30 Mar 17 18:48:34.403213 waagent[1494]: 2025-03-17T18:48:34.403142Z INFO Daemon Daemon Server preferred version:2015-04-05 Mar 17 18:48:34.744885 waagent[1494]: 2025-03-17T18:48:34.744734Z INFO Daemon Daemon Initializing goal state during protocol detection Mar 17 18:48:34.755681 waagent[1494]: 2025-03-17T18:48:34.755605Z INFO Daemon Daemon Forcing an update of the goal state.. Mar 17 18:48:34.760321 waagent[1494]: 2025-03-17T18:48:34.756065Z INFO Daemon Daemon Fetching goal state [incarnation 1] Mar 17 18:48:34.888962 waagent[1494]: 2025-03-17T18:48:34.888830Z INFO Daemon Daemon Found private key matching thumbprint 1BC748347FC8A1C5DC053E23747F0F913E306A89 Mar 17 18:48:34.893603 waagent[1494]: 2025-03-17T18:48:34.893524Z INFO Daemon Daemon Certificate with thumbprint 3ED3A9ADDB67897121DBE1EDAB588B64F9ADBFDB has no matching private key. Mar 17 18:48:34.898669 waagent[1494]: 2025-03-17T18:48:34.898595Z INFO Daemon Daemon Fetch goal state completed Mar 17 18:48:34.943935 waagent[1494]: 2025-03-17T18:48:34.943853Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 8498d8a6-685b-49ca-b75a-91acaa81ebac New eTag: 6094250652433650733] Mar 17 18:48:34.949751 waagent[1494]: 2025-03-17T18:48:34.949683Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 18:48:34.962774 waagent[1494]: 2025-03-17T18:48:34.962699Z INFO Daemon Daemon Starting provisioning Mar 17 18:48:34.965445 waagent[1494]: 2025-03-17T18:48:34.965374Z INFO Daemon Daemon Handle ovf-env.xml. Mar 17 18:48:34.967679 waagent[1494]: 2025-03-17T18:48:34.967619Z INFO Daemon Daemon Set hostname [ci-3510.3.7-a-1304b8c80d] Mar 17 18:48:34.987691 waagent[1494]: 2025-03-17T18:48:34.987589Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-a-1304b8c80d] Mar 17 18:48:34.991104 waagent[1494]: 2025-03-17T18:48:34.991038Z INFO Daemon Daemon Examine /proc/net/route for primary interface Mar 17 18:48:34.994139 waagent[1494]: 2025-03-17T18:48:34.994080Z INFO Daemon Daemon Primary interface is [eth0] Mar 17 18:48:35.008169 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Mar 17 18:48:35.008421 systemd[1]: Stopped systemd-networkd-wait-online.service. Mar 17 18:48:35.008494 systemd[1]: Stopping systemd-networkd-wait-online.service... Mar 17 18:48:35.008838 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:48:35.013049 systemd-networkd[1159]: eth0: DHCPv6 lease lost Mar 17 18:48:35.014359 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:48:35.014519 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:48:35.017111 systemd[1]: Starting systemd-networkd.service... Mar 17 18:48:35.048451 systemd-networkd[1552]: enP53552s1: Link UP Mar 17 18:48:35.048461 systemd-networkd[1552]: enP53552s1: Gained carrier Mar 17 18:48:35.049760 systemd-networkd[1552]: eth0: Link UP Mar 17 18:48:35.049769 systemd-networkd[1552]: eth0: Gained carrier Mar 17 18:48:35.050255 systemd-networkd[1552]: lo: Link UP Mar 17 18:48:35.050264 systemd-networkd[1552]: lo: Gained carrier Mar 17 18:48:35.050588 systemd-networkd[1552]: eth0: Gained IPv6LL Mar 17 18:48:35.050854 systemd-networkd[1552]: Enumeration completed Mar 17 18:48:35.056206 waagent[1494]: 2025-03-17T18:48:35.052360Z INFO Daemon Daemon Create user account if not exists Mar 17 18:48:35.050943 systemd[1]: Started systemd-networkd.service. Mar 17 18:48:35.053873 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:48:35.057778 waagent[1494]: 2025-03-17T18:48:35.057682Z INFO Daemon Daemon User core already exists, skip useradd Mar 17 18:48:35.066936 waagent[1494]: 2025-03-17T18:48:35.061342Z INFO Daemon Daemon Configure sudoer Mar 17 18:48:35.066936 waagent[1494]: 2025-03-17T18:48:35.062395Z INFO Daemon Daemon Configure sshd Mar 17 18:48:35.066936 waagent[1494]: 2025-03-17T18:48:35.063277Z INFO Daemon Daemon Deploy ssh public key. Mar 17 18:48:35.065540 systemd-networkd[1552]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:48:35.105077 systemd-networkd[1552]: eth0: DHCPv4 address 10.200.8.46/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 18:48:35.109519 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:48:36.232518 waagent[1494]: 2025-03-17T18:48:36.232416Z INFO Daemon Daemon Provisioning complete Mar 17 18:48:36.247411 waagent[1494]: 2025-03-17T18:48:36.247341Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Mar 17 18:48:36.254478 waagent[1494]: 2025-03-17T18:48:36.247749Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Mar 17 18:48:36.254478 waagent[1494]: 2025-03-17T18:48:36.249390Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Mar 17 18:48:36.514944 waagent[1561]: 2025-03-17T18:48:36.514842Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Mar 17 18:48:36.515724 waagent[1561]: 2025-03-17T18:48:36.515656Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:36.515867 waagent[1561]: 2025-03-17T18:48:36.515811Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:36.527012 waagent[1561]: 2025-03-17T18:48:36.526918Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Mar 17 18:48:36.527170 waagent[1561]: 2025-03-17T18:48:36.527115Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Mar 17 18:48:36.588108 waagent[1561]: 2025-03-17T18:48:36.587970Z INFO ExtHandler ExtHandler Found private key matching thumbprint 1BC748347FC8A1C5DC053E23747F0F913E306A89 Mar 17 18:48:36.588350 waagent[1561]: 2025-03-17T18:48:36.588275Z INFO ExtHandler ExtHandler Certificate with thumbprint 3ED3A9ADDB67897121DBE1EDAB588B64F9ADBFDB has no matching private key. Mar 17 18:48:36.588610 waagent[1561]: 2025-03-17T18:48:36.588556Z INFO ExtHandler ExtHandler Fetch goal state completed Mar 17 18:48:36.603395 waagent[1561]: 2025-03-17T18:48:36.603335Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: f7f9eebb-178b-49c4-a735-cf77f0c45ae2 New eTag: 6094250652433650733] Mar 17 18:48:36.603907 waagent[1561]: 2025-03-17T18:48:36.603848Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 18:48:36.659624 waagent[1561]: 2025-03-17T18:48:36.659483Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 18:48:36.697865 waagent[1561]: 2025-03-17T18:48:36.697773Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1561 Mar 17 18:48:36.701310 waagent[1561]: 2025-03-17T18:48:36.701244Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 18:48:36.702530 waagent[1561]: 2025-03-17T18:48:36.702471Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 18:48:36.814804 waagent[1561]: 2025-03-17T18:48:36.814662Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 18:48:36.815307 waagent[1561]: 2025-03-17T18:48:36.815223Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 18:48:36.823504 waagent[1561]: 2025-03-17T18:48:36.823448Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 18:48:36.823972 waagent[1561]: 2025-03-17T18:48:36.823913Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 18:48:36.825056 waagent[1561]: 2025-03-17T18:48:36.824975Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Mar 17 18:48:36.826353 waagent[1561]: 2025-03-17T18:48:36.826290Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 18:48:36.826760 waagent[1561]: 2025-03-17T18:48:36.826702Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:36.826916 waagent[1561]: 2025-03-17T18:48:36.826865Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:36.827444 waagent[1561]: 2025-03-17T18:48:36.827387Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 18:48:36.827728 waagent[1561]: 2025-03-17T18:48:36.827671Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 18:48:36.827728 waagent[1561]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 18:48:36.827728 waagent[1561]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 18:48:36.827728 waagent[1561]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 18:48:36.827728 waagent[1561]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:36.827728 waagent[1561]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:36.827728 waagent[1561]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:36.830926 waagent[1561]: 2025-03-17T18:48:36.830715Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 18:48:36.831671 waagent[1561]: 2025-03-17T18:48:36.831604Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:36.831859 waagent[1561]: 2025-03-17T18:48:36.831807Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:36.832500 waagent[1561]: 2025-03-17T18:48:36.832432Z INFO EnvHandler ExtHandler Configure routes Mar 17 18:48:36.832648 waagent[1561]: 2025-03-17T18:48:36.832599Z INFO EnvHandler ExtHandler Gateway:None Mar 17 18:48:36.832777 waagent[1561]: 2025-03-17T18:48:36.832733Z INFO EnvHandler ExtHandler Routes:None Mar 17 18:48:36.833704 waagent[1561]: 2025-03-17T18:48:36.833649Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 18:48:36.833892 waagent[1561]: 2025-03-17T18:48:36.833837Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 18:48:36.834558 waagent[1561]: 2025-03-17T18:48:36.834493Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 18:48:36.834774 waagent[1561]: 2025-03-17T18:48:36.834709Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 18:48:36.834905 waagent[1561]: 2025-03-17T18:48:36.834853Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 18:48:36.847297 waagent[1561]: 2025-03-17T18:48:36.847239Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Mar 17 18:48:36.848168 waagent[1561]: 2025-03-17T18:48:36.848117Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 18:48:36.849202 waagent[1561]: 2025-03-17T18:48:36.849151Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Mar 17 18:48:36.882446 waagent[1561]: 2025-03-17T18:48:36.882355Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Mar 17 18:48:36.925111 waagent[1561]: 2025-03-17T18:48:36.924967Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1552' Mar 17 18:48:37.020696 waagent[1561]: 2025-03-17T18:48:37.020569Z INFO MonitorHandler ExtHandler Network interfaces: Mar 17 18:48:37.020696 waagent[1561]: Executing ['ip', '-a', '-o', 'link']: Mar 17 18:48:37.020696 waagent[1561]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Mar 17 18:48:37.020696 waagent[1561]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:de:66 brd ff:ff:ff:ff:ff:ff Mar 17 18:48:37.020696 waagent[1561]: 3: enP53552s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:de:66 brd ff:ff:ff:ff:ff:ff\ altname enP53552p0s2 Mar 17 18:48:37.020696 waagent[1561]: Executing ['ip', '-4', '-a', '-o', 'address']: Mar 17 18:48:37.020696 waagent[1561]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Mar 17 18:48:37.020696 waagent[1561]: 2: eth0 inet 10.200.8.46/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Mar 17 18:48:37.020696 waagent[1561]: Executing ['ip', '-6', '-a', '-o', 'address']: Mar 17 18:48:37.020696 waagent[1561]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Mar 17 18:48:37.020696 waagent[1561]: 2: eth0 inet6 fe80::7e1e:52ff:fe37:de66/64 scope link \ valid_lft forever preferred_lft forever Mar 17 18:48:37.057683 waagent[1561]: 2025-03-17T18:48:37.057618Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Mar 17 18:48:37.198601 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 18:48:37.198901 systemd[1]: Stopped kubelet.service. Mar 17 18:48:37.198955 systemd[1]: kubelet.service: Consumed 1.120s CPU time. Mar 17 18:48:37.200935 systemd[1]: Starting kubelet.service... Mar 17 18:48:37.252384 waagent[1494]: 2025-03-17T18:48:37.252221Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Mar 17 18:48:37.257736 waagent[1494]: 2025-03-17T18:48:37.257662Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Mar 17 18:48:37.352298 systemd[1]: Started kubelet.service. Mar 17 18:48:37.924426 kubelet[1594]: E0317 18:48:37.924368 1594 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:37.928146 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:37.928313 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:48:38.895167 waagent[1591]: 2025-03-17T18:48:38.895059Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Mar 17 18:48:38.895859 waagent[1591]: 2025-03-17T18:48:38.895789Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 Mar 17 18:48:38.896014 waagent[1591]: 2025-03-17T18:48:38.895949Z INFO ExtHandler ExtHandler Python: 3.9.16 Mar 17 18:48:38.896166 waagent[1591]: 2025-03-17T18:48:38.896118Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Mar 17 18:48:38.905699 waagent[1591]: 2025-03-17T18:48:38.905599Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 18:48:38.906113 waagent[1591]: 2025-03-17T18:48:38.906058Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:38.906283 waagent[1591]: 2025-03-17T18:48:38.906232Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:38.917588 waagent[1591]: 2025-03-17T18:48:38.917518Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Mar 17 18:48:38.926640 waagent[1591]: 2025-03-17T18:48:38.926581Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 Mar 17 18:48:38.927523 waagent[1591]: 2025-03-17T18:48:38.927464Z INFO ExtHandler Mar 17 18:48:38.927669 waagent[1591]: 2025-03-17T18:48:38.927620Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: e5676f81-8a3d-4556-9db7-f32311d32f59 eTag: 6094250652433650733 source: Fabric] Mar 17 18:48:38.928370 waagent[1591]: 2025-03-17T18:48:38.928312Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 18:48:38.929442 waagent[1591]: 2025-03-17T18:48:38.929382Z INFO ExtHandler Mar 17 18:48:38.929578 waagent[1591]: 2025-03-17T18:48:38.929526Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Mar 17 18:48:38.936969 waagent[1591]: 2025-03-17T18:48:38.936915Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 18:48:38.937393 waagent[1591]: 2025-03-17T18:48:38.937343Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 18:48:38.960352 waagent[1591]: 2025-03-17T18:48:38.960280Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Mar 17 18:48:39.024099 waagent[1591]: 2025-03-17T18:48:39.023964Z INFO ExtHandler Downloaded certificate {'thumbprint': '3ED3A9ADDB67897121DBE1EDAB588B64F9ADBFDB', 'hasPrivateKey': False} Mar 17 18:48:39.025068 waagent[1591]: 2025-03-17T18:48:39.024971Z INFO ExtHandler Downloaded certificate {'thumbprint': '1BC748347FC8A1C5DC053E23747F0F913E306A89', 'hasPrivateKey': True} Mar 17 18:48:39.026015 waagent[1591]: 2025-03-17T18:48:39.025941Z INFO ExtHandler Fetch goal state completed Mar 17 18:48:39.046206 waagent[1591]: 2025-03-17T18:48:39.046109Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Mar 17 18:48:39.057368 waagent[1591]: 2025-03-17T18:48:39.057285Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1591 Mar 17 18:48:39.060326 waagent[1591]: 2025-03-17T18:48:39.060262Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 18:48:39.061275 waagent[1591]: 2025-03-17T18:48:39.061217Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Mar 17 18:48:39.061558 waagent[1591]: 2025-03-17T18:48:39.061500Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Mar 17 18:48:39.063416 waagent[1591]: 2025-03-17T18:48:39.063356Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 18:48:39.068013 waagent[1591]: 2025-03-17T18:48:39.067940Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 18:48:39.068397 waagent[1591]: 2025-03-17T18:48:39.068339Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 18:48:39.076199 waagent[1591]: 2025-03-17T18:48:39.076146Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 18:48:39.076639 waagent[1591]: 2025-03-17T18:48:39.076581Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 18:48:39.082422 waagent[1591]: 2025-03-17T18:48:39.082328Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Mar 17 18:48:39.083409 waagent[1591]: 2025-03-17T18:48:39.083342Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Mar 17 18:48:39.084800 waagent[1591]: 2025-03-17T18:48:39.084739Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 18:48:39.085273 waagent[1591]: 2025-03-17T18:48:39.085218Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:39.085437 waagent[1591]: 2025-03-17T18:48:39.085388Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:39.085970 waagent[1591]: 2025-03-17T18:48:39.085914Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 18:48:39.086289 waagent[1591]: 2025-03-17T18:48:39.086232Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 18:48:39.086289 waagent[1591]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 18:48:39.086289 waagent[1591]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 18:48:39.086289 waagent[1591]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 18:48:39.086289 waagent[1591]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:39.086289 waagent[1591]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:39.086289 waagent[1591]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:48:39.089111 waagent[1591]: 2025-03-17T18:48:39.089020Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:48:39.089333 waagent[1591]: 2025-03-17T18:48:39.089268Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 18:48:39.090208 waagent[1591]: 2025-03-17T18:48:39.090149Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 18:48:39.090341 waagent[1591]: 2025-03-17T18:48:39.090267Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:48:39.090950 waagent[1591]: 2025-03-17T18:48:39.090886Z INFO EnvHandler ExtHandler Configure routes Mar 17 18:48:39.091113 waagent[1591]: 2025-03-17T18:48:39.091064Z INFO EnvHandler ExtHandler Gateway:None Mar 17 18:48:39.091249 waagent[1591]: 2025-03-17T18:48:39.091204Z INFO EnvHandler ExtHandler Routes:None Mar 17 18:48:39.091840 waagent[1591]: 2025-03-17T18:48:39.091793Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 18:48:39.096492 waagent[1591]: 2025-03-17T18:48:39.096288Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 18:48:39.096857 waagent[1591]: 2025-03-17T18:48:39.096784Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 18:48:39.105040 waagent[1591]: 2025-03-17T18:48:39.104913Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 18:48:39.108799 waagent[1591]: 2025-03-17T18:48:39.108735Z INFO MonitorHandler ExtHandler Network interfaces: Mar 17 18:48:39.108799 waagent[1591]: Executing ['ip', '-a', '-o', 'link']: Mar 17 18:48:39.108799 waagent[1591]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Mar 17 18:48:39.108799 waagent[1591]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:de:66 brd ff:ff:ff:ff:ff:ff Mar 17 18:48:39.108799 waagent[1591]: 3: enP53552s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:de:66 brd ff:ff:ff:ff:ff:ff\ altname enP53552p0s2 Mar 17 18:48:39.108799 waagent[1591]: Executing ['ip', '-4', '-a', '-o', 'address']: Mar 17 18:48:39.108799 waagent[1591]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Mar 17 18:48:39.108799 waagent[1591]: 2: eth0 inet 10.200.8.46/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Mar 17 18:48:39.108799 waagent[1591]: Executing ['ip', '-6', '-a', '-o', 'address']: Mar 17 18:48:39.108799 waagent[1591]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Mar 17 18:48:39.108799 waagent[1591]: 2: eth0 inet6 fe80::7e1e:52ff:fe37:de66/64 scope link \ valid_lft forever preferred_lft forever Mar 17 18:48:39.118963 waagent[1591]: 2025-03-17T18:48:39.118896Z INFO ExtHandler ExtHandler Downloading agent manifest Mar 17 18:48:39.156852 waagent[1591]: 2025-03-17T18:48:39.156747Z INFO ExtHandler ExtHandler Mar 17 18:48:39.157756 waagent[1591]: 2025-03-17T18:48:39.157697Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 7796cb22-b22a-415f-bbfa-71b3fae655b2 correlation 53bac984-858d-4c41-8359-6170d71560c3 created: 2025-03-17T18:47:05.372276Z] Mar 17 18:48:39.159271 waagent[1591]: 2025-03-17T18:48:39.159207Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 18:48:39.161386 waagent[1591]: 2025-03-17T18:48:39.161331Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Mar 17 18:48:39.188311 waagent[1591]: 2025-03-17T18:48:39.188250Z INFO ExtHandler ExtHandler Looking for existing remote access users. Mar 17 18:48:39.206273 waagent[1591]: 2025-03-17T18:48:39.206139Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0F72981F-B034-4DBD-AD4D-36F387F43906;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Mar 17 18:48:39.277214 waagent[1591]: 2025-03-17T18:48:39.277098Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Mar 17 18:48:39.277214 waagent[1591]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.277214 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.277214 waagent[1591]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.277214 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.277214 waagent[1591]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.277214 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.277214 waagent[1591]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 18:48:39.277214 waagent[1591]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 18:48:39.277214 waagent[1591]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 18:48:39.284203 waagent[1591]: 2025-03-17T18:48:39.284100Z INFO EnvHandler ExtHandler Current Firewall rules: Mar 17 18:48:39.284203 waagent[1591]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.284203 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.284203 waagent[1591]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.284203 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.284203 waagent[1591]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:48:39.284203 waagent[1591]: pkts bytes target prot opt in out source destination Mar 17 18:48:39.284203 waagent[1591]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 18:48:39.284203 waagent[1591]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 18:48:39.284203 waagent[1591]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 18:48:39.284762 waagent[1591]: 2025-03-17T18:48:39.284708Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Mar 17 18:48:48.004591 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 18:48:48.004912 systemd[1]: Stopped kubelet.service. Mar 17 18:48:48.006937 systemd[1]: Starting kubelet.service... Mar 17 18:48:48.088682 systemd[1]: Started kubelet.service. Mar 17 18:48:48.723013 kubelet[1656]: E0317 18:48:48.722952 1656 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:48.724725 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:48.724883 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:48:58.754581 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 18:48:58.754913 systemd[1]: Stopped kubelet.service. Mar 17 18:48:58.756979 systemd[1]: Starting kubelet.service... Mar 17 18:48:58.837748 systemd[1]: Started kubelet.service. Mar 17 18:48:59.469112 kubelet[1667]: E0317 18:48:59.469062 1667 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:48:59.470804 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:48:59.470964 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:49:03.712493 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Mar 17 18:49:09.504839 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Mar 17 18:49:09.505168 systemd[1]: Stopped kubelet.service. Mar 17 18:49:09.507210 systemd[1]: Starting kubelet.service... Mar 17 18:49:09.587650 systemd[1]: Started kubelet.service. Mar 17 18:49:10.228859 kubelet[1678]: E0317 18:49:10.228806 1678 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:49:10.230553 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:49:10.230710 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:49:11.071710 update_engine[1382]: I0317 18:49:11.071624 1382 update_attempter.cc:509] Updating boot flags... Mar 17 18:49:12.486736 systemd[1]: Created slice system-sshd.slice. Mar 17 18:49:12.488972 systemd[1]: Started sshd@0-10.200.8.46:22-10.200.16.10:33462.service. Mar 17 18:49:13.384113 sshd[1724]: Accepted publickey for core from 10.200.16.10 port 33462 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:13.385801 sshd[1724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:13.390264 systemd-logind[1381]: New session 3 of user core. Mar 17 18:49:13.391746 systemd[1]: Started session-3.scope. Mar 17 18:49:14.015824 systemd[1]: Started sshd@1-10.200.8.46:22-10.200.16.10:33476.service. Mar 17 18:49:14.640379 sshd[1729]: Accepted publickey for core from 10.200.16.10 port 33476 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:14.642076 sshd[1729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:14.647772 systemd[1]: Started session-4.scope. Mar 17 18:49:14.648526 systemd-logind[1381]: New session 4 of user core. Mar 17 18:49:15.084864 sshd[1729]: pam_unix(sshd:session): session closed for user core Mar 17 18:49:15.088174 systemd[1]: sshd@1-10.200.8.46:22-10.200.16.10:33476.service: Deactivated successfully. Mar 17 18:49:15.089045 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:49:15.089659 systemd-logind[1381]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:49:15.090397 systemd-logind[1381]: Removed session 4. Mar 17 18:49:15.189842 systemd[1]: Started sshd@2-10.200.8.46:22-10.200.16.10:33484.service. Mar 17 18:49:15.817633 sshd[1735]: Accepted publickey for core from 10.200.16.10 port 33484 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:15.819295 sshd[1735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:15.824705 systemd[1]: Started session-5.scope. Mar 17 18:49:15.825172 systemd-logind[1381]: New session 5 of user core. Mar 17 18:49:16.270159 sshd[1735]: pam_unix(sshd:session): session closed for user core Mar 17 18:49:16.273137 systemd[1]: sshd@2-10.200.8.46:22-10.200.16.10:33484.service: Deactivated successfully. Mar 17 18:49:16.273951 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:49:16.274589 systemd-logind[1381]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:49:16.275341 systemd-logind[1381]: Removed session 5. Mar 17 18:49:16.375027 systemd[1]: Started sshd@3-10.200.8.46:22-10.200.16.10:33492.service. Mar 17 18:49:17.003712 sshd[1744]: Accepted publickey for core from 10.200.16.10 port 33492 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:17.005397 sshd[1744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:17.010294 systemd[1]: Started session-6.scope. Mar 17 18:49:17.010881 systemd-logind[1381]: New session 6 of user core. Mar 17 18:49:17.453948 sshd[1744]: pam_unix(sshd:session): session closed for user core Mar 17 18:49:17.457212 systemd[1]: sshd@3-10.200.8.46:22-10.200.16.10:33492.service: Deactivated successfully. Mar 17 18:49:17.458056 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:49:17.458682 systemd-logind[1381]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:49:17.459428 systemd-logind[1381]: Removed session 6. Mar 17 18:49:17.558750 systemd[1]: Started sshd@4-10.200.8.46:22-10.200.16.10:33508.service. Mar 17 18:49:18.186402 sshd[1750]: Accepted publickey for core from 10.200.16.10 port 33508 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:18.188083 sshd[1750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:18.193659 systemd[1]: Started session-7.scope. Mar 17 18:49:18.194263 systemd-logind[1381]: New session 7 of user core. Mar 17 18:49:18.770630 sudo[1753]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:49:18.771022 sudo[1753]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:49:18.795218 dbus-daemon[1369]: \xd0- \u0014\xfbU: received setenforce notice (enforcing=1172398752) Mar 17 18:49:18.797070 sudo[1753]: pam_unix(sudo:session): session closed for user root Mar 17 18:49:18.923989 sshd[1750]: pam_unix(sshd:session): session closed for user core Mar 17 18:49:18.927655 systemd[1]: sshd@4-10.200.8.46:22-10.200.16.10:33508.service: Deactivated successfully. Mar 17 18:49:18.928694 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:49:18.929333 systemd-logind[1381]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:49:18.930149 systemd-logind[1381]: Removed session 7. Mar 17 18:49:19.028936 systemd[1]: Started sshd@5-10.200.8.46:22-10.200.16.10:41380.service. Mar 17 18:49:19.657579 sshd[1757]: Accepted publickey for core from 10.200.16.10 port 41380 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:19.659305 sshd[1757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:19.664963 systemd[1]: Started session-8.scope. Mar 17 18:49:19.665565 systemd-logind[1381]: New session 8 of user core. Mar 17 18:49:20.002858 sudo[1761]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:49:20.003415 sudo[1761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:49:20.006134 sudo[1761]: pam_unix(sudo:session): session closed for user root Mar 17 18:49:20.010682 sudo[1760]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:49:20.010957 sudo[1760]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:49:20.019673 systemd[1]: Stopping audit-rules.service... Mar 17 18:49:20.020000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:49:20.022159 auditctl[1764]: No rules Mar 17 18:49:20.024621 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:49:20.024676 kernel: audit: type=1305 audit(1742237360.020:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:49:20.024932 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:49:20.025109 systemd[1]: Stopped audit-rules.service. Mar 17 18:49:20.026679 systemd[1]: Starting audit-rules.service... Mar 17 18:49:20.032054 kernel: audit: type=1300 audit(1742237360.020:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf6218aa0 a2=420 a3=0 items=0 ppid=1 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:20.020000 audit[1764]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf6218aa0 a2=420 a3=0 items=0 ppid=1 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:20.020000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:49:20.049121 augenrules[1781]: No rules Mar 17 18:49:20.050492 kernel: audit: type=1327 audit(1742237360.020:201): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:49:20.050549 kernel: audit: type=1131 audit(1742237360.024:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.049836 systemd[1]: Finished audit-rules.service. Mar 17 18:49:20.052277 sudo[1760]: pam_unix(sudo:session): session closed for user root Mar 17 18:49:20.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.068562 kernel: audit: type=1130 audit(1742237360.049:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.068625 kernel: audit: type=1106 audit(1742237360.049:204): pid=1760 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.049000 audit[1760]: USER_END pid=1760 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.089338 kernel: audit: type=1104 audit(1742237360.049:205): pid=1760 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.049000 audit[1760]: CRED_DISP pid=1760 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.152308 sshd[1757]: pam_unix(sshd:session): session closed for user core Mar 17 18:49:20.152000 audit[1757]: USER_END pid=1757 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.155419 systemd[1]: sshd@5-10.200.8.46:22-10.200.16.10:41380.service: Deactivated successfully. Mar 17 18:49:20.156146 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 18:49:20.157512 systemd-logind[1381]: Session 8 logged out. Waiting for processes to exit. Mar 17 18:49:20.158426 systemd-logind[1381]: Removed session 8. Mar 17 18:49:20.153000 audit[1757]: CRED_DISP pid=1757 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.180504 kernel: audit: type=1106 audit(1742237360.152:206): pid=1757 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.180575 kernel: audit: type=1104 audit(1742237360.153:207): pid=1757 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.180612 kernel: audit: type=1131 audit(1742237360.154:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.46:22-10.200.16.10:41380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.46:22-10.200.16.10:41380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.256635 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Mar 17 18:49:20.256830 systemd[1]: Stopped kubelet.service. Mar 17 18:49:20.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.258735 systemd[1]: Starting kubelet.service... Mar 17 18:49:20.260426 systemd[1]: Started sshd@6-10.200.8.46:22-10.200.16.10:41386.service. Mar 17 18:49:20.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.46:22-10.200.16.10:41386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:20.487653 systemd[1]: Started kubelet.service. Mar 17 18:49:20.892000 audit[1788]: USER_ACCT pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.894143 sshd[1788]: Accepted publickey for core from 10.200.16.10 port 41386 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:49:20.894000 audit[1788]: CRED_ACQ pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.894000 audit[1788]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6592810 a2=3 a3=0 items=0 ppid=1 pid=1788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:20.894000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:49:20.896494 sshd[1788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:49:20.903469 systemd[1]: Started session-9.scope. Mar 17 18:49:20.905265 systemd-logind[1381]: New session 9 of user core. Mar 17 18:49:20.909000 audit[1788]: USER_START pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.911000 audit[1799]: CRED_ACQ pid=1799 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:49:20.932004 kubelet[1793]: E0317 18:49:20.931952 1793 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:49:20.933500 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:49:20.933656 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:49:20.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:49:21.237000 audit[1800]: USER_ACCT pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:21.238000 audit[1800]: CRED_REFR pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:21.238966 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:49:21.239275 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:49:21.240000 audit[1800]: USER_START pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:49:21.263166 systemd[1]: Starting docker.service... Mar 17 18:49:21.298095 env[1810]: time="2025-03-17T18:49:21.298043558Z" level=info msg="Starting up" Mar 17 18:49:21.299414 env[1810]: time="2025-03-17T18:49:21.299379558Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 18:49:21.299414 env[1810]: time="2025-03-17T18:49:21.299399758Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 18:49:21.299564 env[1810]: time="2025-03-17T18:49:21.299420058Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 18:49:21.299564 env[1810]: time="2025-03-17T18:49:21.299433458Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 18:49:21.304114 env[1810]: time="2025-03-17T18:49:21.304083357Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 18:49:21.304114 env[1810]: time="2025-03-17T18:49:21.304101757Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 18:49:21.304259 env[1810]: time="2025-03-17T18:49:21.304118957Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 18:49:21.304259 env[1810]: time="2025-03-17T18:49:21.304130857Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 18:49:21.311049 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2246105453-merged.mount: Deactivated successfully. Mar 17 18:49:21.476914 env[1810]: time="2025-03-17T18:49:21.476861131Z" level=info msg="Loading containers: start." Mar 17 18:49:21.554000 audit[1837]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.554000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffc1dc7890 a2=0 a3=7fffc1dc787c items=0 ppid=1810 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Mar 17 18:49:21.556000 audit[1839]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.556000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff704d96a0 a2=0 a3=7fff704d968c items=0 ppid=1810 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Mar 17 18:49:21.558000 audit[1841]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.558000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffdfdd91d0 a2=0 a3=7fffdfdd91bc items=0 ppid=1810 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.558000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 18:49:21.559000 audit[1843]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.559000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5fbf4c00 a2=0 a3=7fff5fbf4bec items=0 ppid=1810 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 18:49:21.561000 audit[1845]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.561000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcc3bb6e0 a2=0 a3=7fffcc3bb6cc items=0 ppid=1810 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.561000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Mar 17 18:49:21.563000 audit[1847]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.563000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffebcd31d0 a2=0 a3=7fffebcd31bc items=0 ppid=1810 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Mar 17 18:49:21.581000 audit[1849]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.581000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd7ac25d0 a2=0 a3=7fffd7ac25bc items=0 ppid=1810 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Mar 17 18:49:21.583000 audit[1851]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.583000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffda5dc8b70 a2=0 a3=7ffda5dc8b5c items=0 ppid=1810 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Mar 17 18:49:21.585000 audit[1853]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.585000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc7630a020 a2=0 a3=7ffc7630a00c items=0 ppid=1810 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:49:21.600000 audit[1857]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.600000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd05966fb0 a2=0 a3=7ffd05966f9c items=0 ppid=1810 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:49:21.606000 audit[1858]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.606000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff32863bb0 a2=0 a3=7fff32863b9c items=0 ppid=1810 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:49:21.650008 kernel: Initializing XFRM netlink socket Mar 17 18:49:21.675670 env[1810]: time="2025-03-17T18:49:21.675631100Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 17 18:49:21.737000 audit[1867]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.737000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffc2aad2a0 a2=0 a3=7fffc2aad28c items=0 ppid=1810 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Mar 17 18:49:21.782000 audit[1870]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.782000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff4cd84f40 a2=0 a3=7fff4cd84f2c items=0 ppid=1810 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Mar 17 18:49:21.786000 audit[1873]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.786000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc7e601ff0 a2=0 a3=7ffc7e601fdc items=0 ppid=1810 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Mar 17 18:49:21.788000 audit[1875]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.788000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe77d98230 a2=0 a3=7ffe77d9821c items=0 ppid=1810 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Mar 17 18:49:21.790000 audit[1877]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.790000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffda5f9a8e0 a2=0 a3=7ffda5f9a8cc items=0 ppid=1810 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Mar 17 18:49:21.792000 audit[1879]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.792000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdc2a95420 a2=0 a3=7ffdc2a9540c items=0 ppid=1810 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Mar 17 18:49:21.794000 audit[1881]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.794000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb71ab410 a2=0 a3=7ffcb71ab3fc items=0 ppid=1810 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Mar 17 18:49:21.796000 audit[1883]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.796000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff45470ad0 a2=0 a3=7fff45470abc items=0 ppid=1810 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Mar 17 18:49:21.798000 audit[1885]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.798000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcd4b56090 a2=0 a3=7ffcd4b5607c items=0 ppid=1810 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 18:49:21.800000 audit[1887]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.800000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffede1cd1f0 a2=0 a3=7ffede1cd1dc items=0 ppid=1810 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 18:49:21.802000 audit[1889]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.802000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd478a5e0 a2=0 a3=7ffdd478a5cc items=0 ppid=1810 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.802000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Mar 17 18:49:21.803801 systemd-networkd[1552]: docker0: Link UP Mar 17 18:49:21.820000 audit[1893]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.820000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc8c28290 a2=0 a3=7fffc8c2827c items=0 ppid=1810 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:49:21.823000 audit[1894]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:21.823000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd63953870 a2=0 a3=7ffd6395385c items=0 ppid=1810 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:21.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 18:49:21.825393 env[1810]: time="2025-03-17T18:49:21.825360278Z" level=info msg="Loading containers: done." Mar 17 18:49:21.837340 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2330324058-merged.mount: Deactivated successfully. Mar 17 18:49:21.863167 env[1810]: time="2025-03-17T18:49:21.863130172Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Mar 17 18:49:21.863366 env[1810]: time="2025-03-17T18:49:21.863341272Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Mar 17 18:49:21.863483 env[1810]: time="2025-03-17T18:49:21.863463472Z" level=info msg="Daemon has completed initialization" Mar 17 18:49:21.890075 systemd[1]: Started docker.service. Mar 17 18:49:21.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:21.898744 env[1810]: time="2025-03-17T18:49:21.898691067Z" level=info msg="API listen on /run/docker.sock" Mar 17 18:49:29.015759 env[1393]: time="2025-03-17T18:49:29.015705470Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.11\"" Mar 17 18:49:29.833043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1555330408.mount: Deactivated successfully. Mar 17 18:49:31.004550 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Mar 17 18:49:31.004821 systemd[1]: Stopped kubelet.service. Mar 17 18:49:31.006671 systemd[1]: Starting kubelet.service... Mar 17 18:49:31.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.010050 kernel: kauditd_printk_skb: 88 callbacks suppressed Mar 17 18:49:31.010134 kernel: audit: type=1130 audit(1742237371.003:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.033017 kernel: audit: type=1131 audit(1742237371.003:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.144851 systemd[1]: Started kubelet.service. Mar 17 18:49:31.157196 kernel: audit: type=1130 audit(1742237371.144:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:31.749552 kubelet[1938]: E0317 18:49:31.749507 1938 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:49:31.751260 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:49:31.751416 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:49:31.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:49:31.765021 kernel: audit: type=1131 audit(1742237371.750:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:49:31.771521 env[1393]: time="2025-03-17T18:49:31.771469778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:31.783332 env[1393]: time="2025-03-17T18:49:31.783270796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5a05c271eac8f5da2f95895ea1ccb9a38f48db3135ba3bdfe35941a396ea8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:31.787081 env[1393]: time="2025-03-17T18:49:31.787045466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:31.792463 env[1393]: time="2025-03-17T18:49:31.792426465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:77c54346965036acc7ac95c3200597ede36db9246179248dde21c1a3ecc1caf0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:31.793107 env[1393]: time="2025-03-17T18:49:31.793077277Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.11\" returns image reference \"sha256:4db5a05c271eac8f5da2f95895ea1ccb9a38f48db3135ba3bdfe35941a396ea8\"" Mar 17 18:49:31.802862 env[1393]: time="2025-03-17T18:49:31.802833357Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.11\"" Mar 17 18:49:33.607764 env[1393]: time="2025-03-17T18:49:33.607706727Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:33.615158 env[1393]: time="2025-03-17T18:49:33.615115057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:de1025c2d496829d3250130380737609ffcdd10a4dce6f2dcd03f23a85a15e6a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:33.620169 env[1393]: time="2025-03-17T18:49:33.620130444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:33.625760 env[1393]: time="2025-03-17T18:49:33.625725242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:d8874f3fb45591ecdac67a3035c730808f18b3ab13147495c7d77eb1960d4f6f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:33.626430 env[1393]: time="2025-03-17T18:49:33.626397554Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.11\" returns image reference \"sha256:de1025c2d496829d3250130380737609ffcdd10a4dce6f2dcd03f23a85a15e6a\"" Mar 17 18:49:33.637313 env[1393]: time="2025-03-17T18:49:33.637283745Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.11\"" Mar 17 18:49:34.937014 env[1393]: time="2025-03-17T18:49:34.936961950Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:34.948041 env[1393]: time="2025-03-17T18:49:34.947988938Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11492f0faf138e933cadd6f533f03e401da9a35e53711e833f18afa6b185b2b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:34.952402 env[1393]: time="2025-03-17T18:49:34.952364512Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:34.958646 env[1393]: time="2025-03-17T18:49:34.958615019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c699f8c97ae7ec819c8bd878d3db104ba72fc440d810d9030e09286b696017b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:34.959275 env[1393]: time="2025-03-17T18:49:34.959242929Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.11\" returns image reference \"sha256:11492f0faf138e933cadd6f533f03e401da9a35e53711e833f18afa6b185b2b7\"" Mar 17 18:49:34.969010 env[1393]: time="2025-03-17T18:49:34.968970895Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\"" Mar 17 18:49:36.221795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount536840099.mount: Deactivated successfully. Mar 17 18:49:36.799096 env[1393]: time="2025-03-17T18:49:36.799041788Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:36.811883 env[1393]: time="2025-03-17T18:49:36.811822095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01045f200a8856c3f5ccfa7be03d72274f1f16fc7a047659e709d603d5c019dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:36.816299 env[1393]: time="2025-03-17T18:49:36.816263266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:36.820731 env[1393]: time="2025-03-17T18:49:36.820700138Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea4da798040a18ed3f302e8d5f67307c7275a2a53bcf3d51bcec223acda84a55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:36.821100 env[1393]: time="2025-03-17T18:49:36.821073444Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.11\" returns image reference \"sha256:01045f200a8856c3f5ccfa7be03d72274f1f16fc7a047659e709d603d5c019dc\"" Mar 17 18:49:36.831417 env[1393]: time="2025-03-17T18:49:36.831360010Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Mar 17 18:49:37.427240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3893601034.mount: Deactivated successfully. Mar 17 18:49:38.619210 env[1393]: time="2025-03-17T18:49:38.619161707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.626168 env[1393]: time="2025-03-17T18:49:38.626130713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.631070 env[1393]: time="2025-03-17T18:49:38.631041688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.639605 env[1393]: time="2025-03-17T18:49:38.639570719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:38.640300 env[1393]: time="2025-03-17T18:49:38.640269830Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Mar 17 18:49:38.649908 env[1393]: time="2025-03-17T18:49:38.649881877Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Mar 17 18:49:39.140241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3960071891.mount: Deactivated successfully. Mar 17 18:49:39.158124 env[1393]: time="2025-03-17T18:49:39.158080083Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:39.168645 env[1393]: time="2025-03-17T18:49:39.168604840Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:39.172452 env[1393]: time="2025-03-17T18:49:39.172417097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:39.177396 env[1393]: time="2025-03-17T18:49:39.177365670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:39.177793 env[1393]: time="2025-03-17T18:49:39.177763476Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Mar 17 18:49:39.187090 env[1393]: time="2025-03-17T18:49:39.187054415Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Mar 17 18:49:39.749083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2584506113.mount: Deactivated successfully. Mar 17 18:49:41.769871 kernel: audit: type=1130 audit(1742237381.753:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:41.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:41.754563 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Mar 17 18:49:41.754811 systemd[1]: Stopped kubelet.service. Mar 17 18:49:41.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:41.768938 systemd[1]: Starting kubelet.service... Mar 17 18:49:41.787014 kernel: audit: type=1131 audit(1742237381.753:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:41.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:41.978307 systemd[1]: Started kubelet.service. Mar 17 18:49:41.994044 kernel: audit: type=1130 audit(1742237381.977:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:42.046809 kubelet[1978]: E0317 18:49:42.046195 1978 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:49:42.064219 kernel: audit: type=1131 audit(1742237382.048:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:49:42.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 18:49:42.049147 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:49:42.049310 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:49:42.675778 env[1393]: time="2025-03-17T18:49:42.675713531Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:42.685549 env[1393]: time="2025-03-17T18:49:42.685507866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:42.688599 env[1393]: time="2025-03-17T18:49:42.688570308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:42.693720 env[1393]: time="2025-03-17T18:49:42.693683378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:42.694512 env[1393]: time="2025-03-17T18:49:42.694475889Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Mar 17 18:49:45.845512 systemd[1]: Stopped kubelet.service. Mar 17 18:49:45.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:45.852443 systemd[1]: Starting kubelet.service... Mar 17 18:49:45.862968 kernel: audit: type=1130 audit(1742237385.844:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:45.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:45.877613 kernel: audit: type=1131 audit(1742237385.844:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:45.894565 systemd[1]: Reloading. Mar 17 18:49:46.018516 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2025-03-17T18:49:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:49:46.018972 /usr/lib/systemd/system-generators/torcx-generator[2070]: time="2025-03-17T18:49:46Z" level=info msg="torcx already run" Mar 17 18:49:46.096461 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:49:46.096483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:49:46.113158 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196023 kernel: audit: type=1400 audit(1742237386.181:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.228154 kernel: audit: type=1400 audit(1742237386.181:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.228276 kernel: audit: audit_backlog=64 > audit_backlog_limit=64 Mar 17 18:49:46.228316 kernel: audit: type=1400 audit(1742237386.181:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.194000 audit: BPF prog-id=41 op=LOAD Mar 17 18:49:46.194000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit: BPF prog-id=42 op=LOAD Mar 17 18:49:46.196000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit: BPF prog-id=43 op=LOAD Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.196000 audit: BPF prog-id=44 op=LOAD Mar 17 18:49:46.196000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:49:46.196000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.197000 audit: BPF prog-id=45 op=LOAD Mar 17 18:49:46.197000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.215000 audit: BPF prog-id=46 op=LOAD Mar 17 18:49:46.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.230000 audit: BPF prog-id=49 op=LOAD Mar 17 18:49:46.230000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit: BPF prog-id=50 op=LOAD Mar 17 18:49:46.232000 audit: BPF prog-id=27 op=UNLOAD Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit: BPF prog-id=51 op=LOAD Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.232000 audit: BPF prog-id=52 op=LOAD Mar 17 18:49:46.232000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:49:46.232000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit: BPF prog-id=53 op=LOAD Mar 17 18:49:46.233000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit: BPF prog-id=54 op=LOAD Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:46.233000 audit: BPF prog-id=55 op=LOAD Mar 17 18:49:46.233000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:49:46.233000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:49:46.253928 systemd[1]: Started kubelet.service. Mar 17 18:49:46.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:46.256662 systemd[1]: Stopping kubelet.service... Mar 17 18:49:46.257319 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:49:46.257518 systemd[1]: Stopped kubelet.service. Mar 17 18:49:46.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:46.259379 systemd[1]: Starting kubelet.service... Mar 17 18:49:46.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:46.491163 systemd[1]: Started kubelet.service. Mar 17 18:49:46.565595 kubelet[2137]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:49:46.566041 kubelet[2137]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:49:46.566112 kubelet[2137]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:49:46.566275 kubelet[2137]: I0317 18:49:46.566241 2137 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:49:47.092603 kubelet[2137]: I0317 18:49:47.092564 2137 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Mar 17 18:49:47.092816 kubelet[2137]: I0317 18:49:47.092806 2137 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:49:47.093172 kubelet[2137]: I0317 18:49:47.093157 2137 server.go:927] "Client rotation is on, will bootstrap in background" Mar 17 18:49:47.181450 kubelet[2137]: I0317 18:49:47.181413 2137 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:49:47.187715 kubelet[2137]: E0317 18:49:47.187639 2137 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.46:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.200924 kubelet[2137]: I0317 18:49:47.200900 2137 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:49:47.201774 kubelet[2137]: I0317 18:49:47.201734 2137 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:49:47.201965 kubelet[2137]: I0317 18:49:47.201776 2137 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-a-1304b8c80d","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Mar 17 18:49:47.202143 kubelet[2137]: I0317 18:49:47.201978 2137 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:49:47.202143 kubelet[2137]: I0317 18:49:47.202003 2137 container_manager_linux.go:301] "Creating device plugin manager" Mar 17 18:49:47.202245 kubelet[2137]: I0317 18:49:47.202146 2137 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:49:47.202963 kubelet[2137]: I0317 18:49:47.202945 2137 kubelet.go:400] "Attempting to sync node with API server" Mar 17 18:49:47.203065 kubelet[2137]: I0317 18:49:47.202966 2137 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:49:47.203065 kubelet[2137]: I0317 18:49:47.203013 2137 kubelet.go:312] "Adding apiserver pod source" Mar 17 18:49:47.203065 kubelet[2137]: I0317 18:49:47.203036 2137 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:49:47.207840 kubelet[2137]: I0317 18:49:47.207825 2137 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:49:47.214411 kubelet[2137]: I0317 18:49:47.214387 2137 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:49:47.214492 kubelet[2137]: W0317 18:49:47.214450 2137 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:49:47.215099 kubelet[2137]: I0317 18:49:47.215080 2137 server.go:1264] "Started kubelet" Mar 17 18:49:47.215281 kubelet[2137]: W0317 18:49:47.215230 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.215355 kubelet[2137]: E0317 18:49:47.215297 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.215406 kubelet[2137]: W0317 18:49:47.215376 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-1304b8c80d&limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.215450 kubelet[2137]: E0317 18:49:47.215420 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-1304b8c80d&limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.216632 kubelet[2137]: I0317 18:49:47.216340 2137 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:49:47.217273 kubelet[2137]: I0317 18:49:47.217226 2137 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:49:47.217606 kubelet[2137]: I0317 18:49:47.217589 2137 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:49:47.218957 kubelet[2137]: I0317 18:49:47.218322 2137 server.go:455] "Adding debug handlers to kubelet server" Mar 17 18:49:47.224023 kernel: kauditd_printk_skb: 217 callbacks suppressed Mar 17 18:49:47.224096 kernel: audit: type=1400 audit(1742237387.219:409): avc: denied { mac_admin } for pid=2137 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:47.219000 audit[2137]: AVC avc: denied { mac_admin } for pid=2137 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:47.224186 kubelet[2137]: I0317 18:49:47.221043 2137 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:49:47.224186 kubelet[2137]: I0317 18:49:47.221081 2137 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:49:47.224186 kubelet[2137]: I0317 18:49:47.221147 2137 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:49:47.231369 kubelet[2137]: I0317 18:49:47.231352 2137 volume_manager.go:291] "Starting Kubelet Volume Manager" Mar 17 18:49:47.233768 kubelet[2137]: I0317 18:49:47.233754 2137 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 18:49:47.233902 kubelet[2137]: I0317 18:49:47.233893 2137 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:49:47.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:47.243555 kernel: audit: type=1401 audit(1742237387.219:409): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:47.243628 kernel: audit: type=1300 audit(1742237387.219:409): arch=c000003e syscall=188 success=no exit=-22 a0=c000827980 a1=c000831968 a2=c000827950 a3=25 items=0 ppid=1 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.219000 audit[2137]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000827980 a1=c000831968 a2=c000827950 a3=25 items=0 ppid=1 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.245280 kubelet[2137]: E0317 18:49:47.245253 2137 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-1304b8c80d?timeout=10s\": dial tcp 10.200.8.46:6443: connect: connection refused" interval="200ms" Mar 17 18:49:47.248664 kubelet[2137]: I0317 18:49:47.248647 2137 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:49:47.248756 kubelet[2137]: I0317 18:49:47.248749 2137 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:49:47.248869 kubelet[2137]: I0317 18:49:47.248857 2137 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:49:47.253973 kubelet[2137]: W0317 18:49:47.253927 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.254089 kubelet[2137]: E0317 18:49:47.254078 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.254204 kubelet[2137]: E0317 18:49:47.254192 2137 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:49:47.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:47.267106 kubelet[2137]: E0317 18:49:47.262798 2137 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.46:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.46:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-a-1304b8c80d.182dabac435baba8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-a-1304b8c80d,UID:ci-3510.3.7-a-1304b8c80d,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-a-1304b8c80d,},FirstTimestamp:2025-03-17 18:49:47.215055784 +0000 UTC m=+0.718417846,LastTimestamp:2025-03-17 18:49:47.215055784 +0000 UTC m=+0.718417846,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-a-1304b8c80d,}" Mar 17 18:49:47.277944 kernel: audit: type=1327 audit(1742237387.219:409): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:47.219000 audit[2137]: AVC avc: denied { mac_admin } for pid=2137 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:47.297445 kernel: audit: type=1400 audit(1742237387.219:410): avc: denied { mac_admin } for pid=2137 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:47.297521 kernel: audit: type=1401 audit(1742237387.219:410): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:47.219000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:47.316363 kernel: audit: type=1300 audit(1742237387.219:410): arch=c000003e syscall=188 success=no exit=-22 a0=c0008f76a0 a1=c000831980 a2=c000827a10 a3=25 items=0 ppid=1 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.219000 audit[2137]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f76a0 a1=c000831980 a2=c000827a10 a3=25 items=0 ppid=1 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.333748 kernel: audit: type=1327 audit(1742237387.219:410): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:47.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:47.344265 kernel: audit: type=1325 audit(1742237387.223:411): table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.223000 audit[2147]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.344505 kubelet[2137]: I0317 18:49:47.336583 2137 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:49:47.344505 kubelet[2137]: I0317 18:49:47.338148 2137 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:49:47.344505 kubelet[2137]: I0317 18:49:47.338173 2137 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:49:47.344505 kubelet[2137]: I0317 18:49:47.338198 2137 kubelet.go:2337] "Starting kubelet main sync loop" Mar 17 18:49:47.344505 kubelet[2137]: E0317 18:49:47.338237 2137 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 18:49:47.344505 kubelet[2137]: W0317 18:49:47.342899 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.344505 kubelet[2137]: E0317 18:49:47.342959 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:47.223000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe67b91100 a2=0 a3=7ffe67b910ec items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:49:47.223000 audit[2148]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.364025 kernel: audit: type=1300 audit(1742237387.223:411): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe67b91100 a2=0 a3=7ffe67b910ec items=0 ppid=2137 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.223000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8c5fe250 a2=0 a3=7ffe8c5fe23c items=0 ppid=2137 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:49:47.228000 audit[2150]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.228000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe072712b0 a2=0 a3=7ffe0727129c items=0 ppid=2137 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:49:47.233000 audit[2152]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.233000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd0f5e5ee0 a2=0 a3=7ffd0f5e5ecc items=0 ppid=2137 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:49:47.333000 audit[2159]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.333000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc7ee8ce30 a2=0 a3=7ffc7ee8ce1c items=0 ppid=2137 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:49:47.333000 audit[2160]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:49:47.333000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0ae75d60 a2=0 a3=7fff0ae75d4c items=0 ppid=2137 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:49:47.333000 audit[2161]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.333000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1d0504b0 a2=0 a3=7ffc1d05049c items=0 ppid=2137 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:49:47.350000 audit[2164]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.350000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc30e9cdb0 a2=0 a3=7ffc30e9cd9c items=0 ppid=2137 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:49:47.363000 audit[2165]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:49:47.363000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0d3bab70 a2=0 a3=7ffc0d3bab5c items=0 ppid=2137 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:49:47.365000 audit[2166]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:49:47.365000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff9e9eec60 a2=0 a3=7fff9e9eec4c items=0 ppid=2137 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:49:47.366000 audit[2167]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:49:47.366000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1a91dd40 a2=0 a3=7ffc1a91dd2c items=0 ppid=2137 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.366000 audit[2168]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:49:47.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:49:47.366000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff71b8bde0 a2=0 a3=7fff71b8bdcc items=0 ppid=2137 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:49:47.438622 kubelet[2137]: E0317 18:49:47.438568 2137 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Mar 17 18:49:47.446181 kubelet[2137]: E0317 18:49:47.446136 2137 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-1304b8c80d?timeout=10s\": dial tcp 10.200.8.46:6443: connect: connection refused" interval="400ms" Mar 17 18:49:47.464584 kubelet[2137]: I0317 18:49:47.464551 2137 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.465172 kubelet[2137]: E0317 18:49:47.465135 2137 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.46:6443/api/v1/nodes\": dial tcp 10.200.8.46:6443: connect: connection refused" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.465425 kubelet[2137]: I0317 18:49:47.465399 2137 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:49:47.465425 kubelet[2137]: I0317 18:49:47.465425 2137 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:49:47.465573 kubelet[2137]: I0317 18:49:47.465445 2137 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:49:47.472102 kubelet[2137]: I0317 18:49:47.472079 2137 policy_none.go:49] "None policy: Start" Mar 17 18:49:47.472695 kubelet[2137]: I0317 18:49:47.472677 2137 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:49:47.472788 kubelet[2137]: I0317 18:49:47.472713 2137 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:49:47.482283 systemd[1]: Created slice kubepods.slice. Mar 17 18:49:47.486561 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:49:47.489428 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:49:47.495588 kubelet[2137]: I0317 18:49:47.495561 2137 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:49:47.494000 audit[2137]: AVC avc: denied { mac_admin } for pid=2137 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:47.494000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:47.494000 audit[2137]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b76000 a1=c0008316c8 a2=c0004e1f80 a3=25 items=0 ppid=1 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:47.494000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:47.495930 kubelet[2137]: I0317 18:49:47.495623 2137 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:49:47.495930 kubelet[2137]: I0317 18:49:47.495735 2137 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:49:47.495930 kubelet[2137]: I0317 18:49:47.495860 2137 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:49:47.499396 kubelet[2137]: E0317 18:49:47.499375 2137 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-a-1304b8c80d\" not found" Mar 17 18:49:47.639700 kubelet[2137]: I0317 18:49:47.639297 2137 topology_manager.go:215] "Topology Admit Handler" podUID="26c18f5d48a0ace9b30f9e7d6347355a" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.642297 kubelet[2137]: I0317 18:49:47.642268 2137 topology_manager.go:215] "Topology Admit Handler" podUID="1c21e7001aca2f90b23a1b68ad175e82" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.644592 kubelet[2137]: I0317 18:49:47.644566 2137 topology_manager.go:215] "Topology Admit Handler" podUID="85d249ae4a56220759aa47d86d732de2" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.651208 systemd[1]: Created slice kubepods-burstable-pod26c18f5d48a0ace9b30f9e7d6347355a.slice. Mar 17 18:49:47.661440 systemd[1]: Created slice kubepods-burstable-pod1c21e7001aca2f90b23a1b68ad175e82.slice. Mar 17 18:49:47.665225 systemd[1]: Created slice kubepods-burstable-pod85d249ae4a56220759aa47d86d732de2.slice. Mar 17 18:49:47.666939 kubelet[2137]: I0317 18:49:47.666919 2137 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.667475 kubelet[2137]: E0317 18:49:47.667450 2137 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.46:6443/api/v1/nodes\": dial tcp 10.200.8.46:6443: connect: connection refused" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737161 kubelet[2137]: I0317 18:49:47.737121 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737161 kubelet[2137]: I0317 18:49:47.737159 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737366 kubelet[2137]: I0317 18:49:47.737187 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737366 kubelet[2137]: I0317 18:49:47.737209 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/85d249ae4a56220759aa47d86d732de2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-a-1304b8c80d\" (UID: \"85d249ae4a56220759aa47d86d732de2\") " pod="kube-system/kube-scheduler-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737366 kubelet[2137]: I0317 18:49:47.737231 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737366 kubelet[2137]: I0317 18:49:47.737251 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737366 kubelet[2137]: I0317 18:49:47.737274 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737515 kubelet[2137]: I0317 18:49:47.737294 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.737515 kubelet[2137]: I0317 18:49:47.737321 2137 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:47.847292 kubelet[2137]: E0317 18:49:47.847238 2137 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-1304b8c80d?timeout=10s\": dial tcp 10.200.8.46:6443: connect: connection refused" interval="800ms" Mar 17 18:49:47.963164 env[1393]: time="2025-03-17T18:49:47.962761926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-a-1304b8c80d,Uid:26c18f5d48a0ace9b30f9e7d6347355a,Namespace:kube-system,Attempt:0,}" Mar 17 18:49:47.965425 env[1393]: time="2025-03-17T18:49:47.965386458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-a-1304b8c80d,Uid:1c21e7001aca2f90b23a1b68ad175e82,Namespace:kube-system,Attempt:0,}" Mar 17 18:49:47.969112 env[1393]: time="2025-03-17T18:49:47.969081502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-a-1304b8c80d,Uid:85d249ae4a56220759aa47d86d732de2,Namespace:kube-system,Attempt:0,}" Mar 17 18:49:48.069362 kubelet[2137]: I0317 18:49:48.069327 2137 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:48.069762 kubelet[2137]: E0317 18:49:48.069687 2137 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.46:6443/api/v1/nodes\": dial tcp 10.200.8.46:6443: connect: connection refused" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:48.177064 kubelet[2137]: W0317 18:49:48.177016 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.177248 kubelet[2137]: E0317 18:49:48.177104 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.558580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1638725262.mount: Deactivated successfully. Mar 17 18:49:48.585905 env[1393]: time="2025-03-17T18:49:48.585847684Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.597598 env[1393]: time="2025-03-17T18:49:48.597543222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.605695 env[1393]: time="2025-03-17T18:49:48.605655718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.608883 env[1393]: time="2025-03-17T18:49:48.608848155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.612258 env[1393]: time="2025-03-17T18:49:48.612225095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.615107 env[1393]: time="2025-03-17T18:49:48.615072729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.618685 env[1393]: time="2025-03-17T18:49:48.618653971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.624336 env[1393]: time="2025-03-17T18:49:48.624303037Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.631952 env[1393]: time="2025-03-17T18:49:48.631914627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.635126 env[1393]: time="2025-03-17T18:49:48.635092065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.640390 env[1393]: time="2025-03-17T18:49:48.640358427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.648173 kubelet[2137]: E0317 18:49:48.648129 2137 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-1304b8c80d?timeout=10s\": dial tcp 10.200.8.46:6443: connect: connection refused" interval="1.6s" Mar 17 18:49:48.661184 env[1393]: time="2025-03-17T18:49:48.661146372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:49:48.690512 env[1393]: time="2025-03-17T18:49:48.690417117Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:48.690689 env[1393]: time="2025-03-17T18:49:48.690458717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:48.690689 env[1393]: time="2025-03-17T18:49:48.690494218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:48.691055 env[1393]: time="2025-03-17T18:49:48.690717821Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dd653a1d27676374db83a266673040bc230a2a5ced59dccaefd1d609025f1d4 pid=2177 runtime=io.containerd.runc.v2 Mar 17 18:49:48.715462 systemd[1]: Started cri-containerd-2dd653a1d27676374db83a266673040bc230a2a5ced59dccaefd1d609025f1d4.scope. Mar 17 18:49:48.724237 env[1393]: time="2025-03-17T18:49:48.724114014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:48.724237 env[1393]: time="2025-03-17T18:49:48.724153915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:48.724237 env[1393]: time="2025-03-17T18:49:48.724168615Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:48.724470 env[1393]: time="2025-03-17T18:49:48.724302717Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/909532d43db600f7ee8dc149c77d46e4282ec8ff335466043b1f699af9dbe9be pid=2205 runtime=io.containerd.runc.v2 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.738000 audit: BPF prog-id=56 op=LOAD Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643635336131643237363736333734646238336132363636373330 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643635336131643237363736333734646238336132363636373330 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit: BPF prog-id=57 op=LOAD Mar 17 18:49:48.739000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000331b90 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643635336131643237363736333734646238336132363636373330 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit: BPF prog-id=58 op=LOAD Mar 17 18:49:48.739000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000331bd8 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643635336131643237363736333734646238336132363636373330 Mar 17 18:49:48.739000 audit: BPF prog-id=58 op=UNLOAD Mar 17 18:49:48.739000 audit: BPF prog-id=57 op=UNLOAD Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.739000 audit: BPF prog-id=59 op=LOAD Mar 17 18:49:48.739000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000331fe8 items=0 ppid=2177 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643635336131643237363736333734646238336132363636373330 Mar 17 18:49:48.746210 kubelet[2137]: W0317 18:49:48.746108 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.746210 kubelet[2137]: E0317 18:49:48.746177 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.747367 env[1393]: time="2025-03-17T18:49:48.747296588Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:49:48.747494 env[1393]: time="2025-03-17T18:49:48.747378489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:49:48.747494 env[1393]: time="2025-03-17T18:49:48.747408789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:49:48.747637 env[1393]: time="2025-03-17T18:49:48.747593591Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b10a3149966e6dbe30b1d584a8b58cde82b73cdee877a6caaf63218e7354a981 pid=2229 runtime=io.containerd.runc.v2 Mar 17 18:49:48.757942 systemd[1]: Started cri-containerd-909532d43db600f7ee8dc149c77d46e4282ec8ff335466043b1f699af9dbe9be.scope. Mar 17 18:49:48.766075 kubelet[2137]: W0317 18:49:48.765931 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-1304b8c80d&limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.766075 kubelet[2137]: E0317 18:49:48.766033 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-1304b8c80d&limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.777623 systemd[1]: Started cri-containerd-b10a3149966e6dbe30b1d584a8b58cde82b73cdee877a6caaf63218e7354a981.scope. Mar 17 18:49:48.797670 kubelet[2137]: W0317 18:49:48.797551 2137 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.797670 kubelet[2137]: E0317 18:49:48.797641 2137 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.46:6443: connect: connection refused Mar 17 18:49:48.800071 env[1393]: time="2025-03-17T18:49:48.799513803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-a-1304b8c80d,Uid:26c18f5d48a0ace9b30f9e7d6347355a,Namespace:kube-system,Attempt:0,} returns sandbox id \"2dd653a1d27676374db83a266673040bc230a2a5ced59dccaefd1d609025f1d4\"" Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.804000 audit: BPF prog-id=60 op=LOAD Mar 17 18:49:48.807000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.807000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.808604 env[1393]: time="2025-03-17T18:49:48.808479609Z" level=info msg="CreateContainer within sandbox \"2dd653a1d27676374db83a266673040bc230a2a5ced59dccaefd1d609025f1d4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Mar 17 18:49:48.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393533326434336462363030663765653864633134396337376434 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393533326434336462363030663765653864633134396337376434 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.811000 audit: BPF prog-id=61 op=LOAD Mar 17 18:49:48.811000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003004f0 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393533326434336462363030663765653864633134396337376434 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.812000 audit: BPF prog-id=62 op=LOAD Mar 17 18:49:48.812000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000300538 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393533326434336462363030663765653864633134396337376434 Mar 17 18:49:48.813000 audit: BPF prog-id=62 op=UNLOAD Mar 17 18:49:48.813000 audit: BPF prog-id=61 op=UNLOAD Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { perfmon } for pid=2214 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit[2214]: AVC avc: denied { bpf } for pid=2214 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.813000 audit: BPF prog-id=63 op=LOAD Mar 17 18:49:48.813000 audit[2214]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000300948 items=0 ppid=2205 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393533326434336462363030663765653864633134396337376434 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.815000 audit: BPF prog-id=64 op=LOAD Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2229 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306133313439393636653664626533306231643538346138623538 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2229 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306133313439393636653664626533306231643538346138623538 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit: BPF prog-id=65 op=LOAD Mar 17 18:49:48.816000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028a1c0 items=0 ppid=2229 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306133313439393636653664626533306231643538346138623538 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit: BPF prog-id=66 op=LOAD Mar 17 18:49:48.816000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028a208 items=0 ppid=2229 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306133313439393636653664626533306231643538346138623538 Mar 17 18:49:48.816000 audit: BPF prog-id=66 op=UNLOAD Mar 17 18:49:48.816000 audit: BPF prog-id=65 op=UNLOAD Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { perfmon } for pid=2248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit[2248]: AVC avc: denied { bpf } for pid=2248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.816000 audit: BPF prog-id=67 op=LOAD Mar 17 18:49:48.816000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028a618 items=0 ppid=2229 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231306133313439393636653664626533306231643538346138623538 Mar 17 18:49:48.847636 env[1393]: time="2025-03-17T18:49:48.847592970Z" level=info msg="CreateContainer within sandbox \"2dd653a1d27676374db83a266673040bc230a2a5ced59dccaefd1d609025f1d4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8526c62612498d672102e620e996a8fa4e2bf6b4ad8c70e091d8921305348237\"" Mar 17 18:49:48.848158 env[1393]: time="2025-03-17T18:49:48.848129277Z" level=info msg="StartContainer for \"8526c62612498d672102e620e996a8fa4e2bf6b4ad8c70e091d8921305348237\"" Mar 17 18:49:48.861774 env[1393]: time="2025-03-17T18:49:48.861734437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-a-1304b8c80d,Uid:1c21e7001aca2f90b23a1b68ad175e82,Namespace:kube-system,Attempt:0,} returns sandbox id \"909532d43db600f7ee8dc149c77d46e4282ec8ff335466043b1f699af9dbe9be\"" Mar 17 18:49:48.865189 env[1393]: time="2025-03-17T18:49:48.865143577Z" level=info msg="CreateContainer within sandbox \"909532d43db600f7ee8dc149c77d46e4282ec8ff335466043b1f699af9dbe9be\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Mar 17 18:49:48.871950 kubelet[2137]: I0317 18:49:48.871895 2137 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:48.872376 kubelet[2137]: E0317 18:49:48.872341 2137 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.46:6443/api/v1/nodes\": dial tcp 10.200.8.46:6443: connect: connection refused" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:48.879405 systemd[1]: Started cri-containerd-8526c62612498d672102e620e996a8fa4e2bf6b4ad8c70e091d8921305348237.scope. Mar 17 18:49:48.884084 env[1393]: time="2025-03-17T18:49:48.883555594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-a-1304b8c80d,Uid:85d249ae4a56220759aa47d86d732de2,Namespace:kube-system,Attempt:0,} returns sandbox id \"b10a3149966e6dbe30b1d584a8b58cde82b73cdee877a6caaf63218e7354a981\"" Mar 17 18:49:48.888679 env[1393]: time="2025-03-17T18:49:48.888632354Z" level=info msg="CreateContainer within sandbox \"b10a3149966e6dbe30b1d584a8b58cde82b73cdee877a6caaf63218e7354a981\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.902000 audit: BPF prog-id=68 op=LOAD Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2177 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323663363236313234393864363732313032653632306539393661 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2177 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323663363236313234393864363732313032653632306539393661 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit: BPF prog-id=69 op=LOAD Mar 17 18:49:48.903000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002171e0 items=0 ppid=2177 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323663363236313234393864363732313032653632306539393661 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit: BPF prog-id=70 op=LOAD Mar 17 18:49:48.903000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000217228 items=0 ppid=2177 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323663363236313234393864363732313032653632306539393661 Mar 17 18:49:48.903000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:49:48.903000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.903000 audit: BPF prog-id=71 op=LOAD Mar 17 18:49:48.903000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217638 items=0 ppid=2177 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323663363236313234393864363732313032653632306539393661 Mar 17 18:49:48.910666 env[1393]: time="2025-03-17T18:49:48.910618013Z" level=info msg="CreateContainer within sandbox \"909532d43db600f7ee8dc149c77d46e4282ec8ff335466043b1f699af9dbe9be\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"47c90c70c8fad49ae05cbfaed9c56e30fbffdae2bce4d907e870edb75a80d518\"" Mar 17 18:49:48.911154 env[1393]: time="2025-03-17T18:49:48.911126419Z" level=info msg="StartContainer for \"47c90c70c8fad49ae05cbfaed9c56e30fbffdae2bce4d907e870edb75a80d518\"" Mar 17 18:49:48.938308 systemd[1]: Started cri-containerd-47c90c70c8fad49ae05cbfaed9c56e30fbffdae2bce4d907e870edb75a80d518.scope. Mar 17 18:49:48.956408 env[1393]: time="2025-03-17T18:49:48.956360353Z" level=info msg="CreateContainer within sandbox \"b10a3149966e6dbe30b1d584a8b58cde82b73cdee877a6caaf63218e7354a981\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3ec34ed63ff790eef928b1fd0bb8a4536c6a11566d561a08a4f29b309bfc2a99\"" Mar 17 18:49:48.957249 env[1393]: time="2025-03-17T18:49:48.957220863Z" level=info msg="StartContainer for \"3ec34ed63ff790eef928b1fd0bb8a4536c6a11566d561a08a4f29b309bfc2a99\"" Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit: BPF prog-id=72 op=LOAD Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2205 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633930633730633866616434396165303563626661656439633536 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2205 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633930633730633866616434396165303563626661656439633536 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.958000 audit: BPF prog-id=73 op=LOAD Mar 17 18:49:48.958000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003928b0 items=0 ppid=2205 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633930633730633866616434396165303563626661656439633536 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit: BPF prog-id=74 op=LOAD Mar 17 18:49:48.959000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003928f8 items=0 ppid=2205 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633930633730633866616434396165303563626661656439633536 Mar 17 18:49:48.959000 audit: BPF prog-id=74 op=UNLOAD Mar 17 18:49:48.959000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:48.959000 audit: BPF prog-id=75 op=LOAD Mar 17 18:49:48.959000 audit[2328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000392d08 items=0 ppid=2205 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:48.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437633930633730633866616434396165303563626661656439633536 Mar 17 18:49:48.972490 env[1393]: time="2025-03-17T18:49:48.972450242Z" level=info msg="StartContainer for \"8526c62612498d672102e620e996a8fa4e2bf6b4ad8c70e091d8921305348237\" returns successfully" Mar 17 18:49:48.986596 systemd[1]: Started cri-containerd-3ec34ed63ff790eef928b1fd0bb8a4536c6a11566d561a08a4f29b309bfc2a99.scope. Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit: BPF prog-id=76 op=LOAD Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633334656436336666373930656566393238623166643062623861 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633334656436336666373930656566393238623166643062623861 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.013000 audit: BPF prog-id=77 op=LOAD Mar 17 18:49:49.013000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cf0 items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633334656436336666373930656566393238623166643062623861 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit: BPF prog-id=78 op=LOAD Mar 17 18:49:49.014000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d38 items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633334656436336666373930656566393238623166643062623861 Mar 17 18:49:49.014000 audit: BPF prog-id=78 op=UNLOAD Mar 17 18:49:49.014000 audit: BPF prog-id=77 op=UNLOAD Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:49.014000 audit: BPF prog-id=79 op=LOAD Mar 17 18:49:49.014000 audit[2362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e8148 items=0 ppid=2229 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:49.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365633334656436336666373930656566393238623166643062623861 Mar 17 18:49:49.039744 env[1393]: time="2025-03-17T18:49:49.039696624Z" level=info msg="StartContainer for \"47c90c70c8fad49ae05cbfaed9c56e30fbffdae2bce4d907e870edb75a80d518\" returns successfully" Mar 17 18:49:49.080737 env[1393]: time="2025-03-17T18:49:49.080620794Z" level=info msg="StartContainer for \"3ec34ed63ff790eef928b1fd0bb8a4536c6a11566d561a08a4f29b309bfc2a99\" returns successfully" Mar 17 18:49:50.474753 kubelet[2137]: I0317 18:49:50.474723 2137 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:50.745000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:50.745000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00063e720 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:50.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:50.746000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:50.746000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005f20e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:50.746000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:51.233000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.233000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004cae690 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.233000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.233000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005eee1e0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.234000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.234000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005ecdbe0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.235000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.235000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c004caf230 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.278000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.278000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c002315a80 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.278000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:51.278000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=83 a1=c0044b45a0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:49:51.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:49:51.361611 kubelet[2137]: E0317 18:49:51.361562 2137 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-a-1304b8c80d\" not found" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:52.374139 kubelet[2137]: I0317 18:49:52.374100 2137 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:53.372402 kubelet[2137]: I0317 18:49:53.372372 2137 apiserver.go:52] "Watching apiserver" Mar 17 18:49:53.434347 kubelet[2137]: I0317 18:49:53.434257 2137 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 18:49:54.532767 kubelet[2137]: W0317 18:49:54.532731 2137 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 18:49:55.608645 systemd[1]: Reloading. Mar 17 18:49:55.709958 /usr/lib/systemd/system-generators/torcx-generator[2427]: time="2025-03-17T18:49:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:49:55.714685 /usr/lib/systemd/system-generators/torcx-generator[2427]: time="2025-03-17T18:49:55Z" level=info msg="torcx already run" Mar 17 18:49:55.794672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:49:55.794691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:49:55.812978 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:49:55.912798 kernel: kauditd_printk_skb: 404 callbacks suppressed Mar 17 18:49:55.912939 kernel: audit: type=1400 audit(1742237395.894:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.947169 kernel: audit: type=1400 audit(1742237395.894:541): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.947263 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:49:55.947290 kernel: audit: type=1400 audit(1742237395.894:542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.947312 kernel: audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.963327 kernel: audit: type=1400 audit(1742237395.894:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.963421 kernel: audit: backlog limit exceeded Mar 17 18:49:55.963451 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.989035 kernel: audit: type=1400 audit(1742237395.894:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.989158 kernel: audit: audit_lost=25 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.898000 audit: BPF prog-id=80 op=LOAD Mar 17 18:49:55.898000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.911000 audit: BPF prog-id=81 op=LOAD Mar 17 18:49:55.911000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit: BPF prog-id=82 op=LOAD Mar 17 18:49:55.915000 audit: BPF prog-id=42 op=UNLOAD Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit: BPF prog-id=83 op=LOAD Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit: BPF prog-id=84 op=LOAD Mar 17 18:49:55.915000 audit: BPF prog-id=43 op=UNLOAD Mar 17 18:49:55.915000 audit: BPF prog-id=44 op=UNLOAD Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.950000 audit: BPF prog-id=45 op=UNLOAD Mar 17 18:49:55.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit: BPF prog-id=89 op=LOAD Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.993000 audit: BPF prog-id=90 op=LOAD Mar 17 18:49:55.993000 audit: BPF prog-id=47 op=UNLOAD Mar 17 18:49:55.993000 audit: BPF prog-id=48 op=UNLOAD Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.996000 audit: BPF prog-id=91 op=LOAD Mar 17 18:49:55.996000 audit: BPF prog-id=72 op=UNLOAD Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.997000 audit: BPF prog-id=92 op=LOAD Mar 17 18:49:55.997000 audit: BPF prog-id=64 op=UNLOAD Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:55.998000 audit: BPF prog-id=93 op=LOAD Mar 17 18:49:55.998000 audit: BPF prog-id=49 op=UNLOAD Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit: BPF prog-id=94 op=LOAD Mar 17 18:49:56.000000 audit: BPF prog-id=50 op=UNLOAD Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit: BPF prog-id=95 op=LOAD Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit: BPF prog-id=96 op=LOAD Mar 17 18:49:56.001000 audit: BPF prog-id=51 op=UNLOAD Mar 17 18:49:56.001000 audit: BPF prog-id=52 op=UNLOAD Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit: BPF prog-id=97 op=LOAD Mar 17 18:49:56.001000 audit: BPF prog-id=53 op=UNLOAD Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit: BPF prog-id=98 op=LOAD Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.001000 audit: BPF prog-id=99 op=LOAD Mar 17 18:49:56.001000 audit: BPF prog-id=54 op=UNLOAD Mar 17 18:49:56.001000 audit: BPF prog-id=55 op=UNLOAD Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.003000 audit: BPF prog-id=100 op=LOAD Mar 17 18:49:56.003000 audit: BPF prog-id=60 op=UNLOAD Mar 17 18:49:56.022011 systemd[1]: Stopping kubelet.service... Mar 17 18:49:56.040244 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:49:56.040450 systemd[1]: Stopped kubelet.service. Mar 17 18:49:56.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:56.040514 systemd[1]: kubelet.service: Consumed 1.029s CPU time. Mar 17 18:49:56.042472 systemd[1]: Starting kubelet.service... Mar 17 18:49:56.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:49:56.260108 systemd[1]: Started kubelet.service. Mar 17 18:49:56.336324 kubelet[2493]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:49:56.336324 kubelet[2493]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:49:56.336324 kubelet[2493]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:49:56.336808 kubelet[2493]: I0317 18:49:56.336407 2493 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:49:56.341343 kubelet[2493]: I0317 18:49:56.341299 2493 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Mar 17 18:49:56.341343 kubelet[2493]: I0317 18:49:56.341320 2493 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:49:56.341616 kubelet[2493]: I0317 18:49:56.341597 2493 server.go:927] "Client rotation is on, will bootstrap in background" Mar 17 18:49:56.342868 kubelet[2493]: I0317 18:49:56.342841 2493 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Mar 17 18:49:56.344272 kubelet[2493]: I0317 18:49:56.344249 2493 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:49:56.356416 kubelet[2493]: I0317 18:49:56.356401 2493 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:49:56.356704 kubelet[2493]: I0317 18:49:56.356680 2493 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:49:56.356931 kubelet[2493]: I0317 18:49:56.356769 2493 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-a-1304b8c80d","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Mar 17 18:49:56.357100 kubelet[2493]: I0317 18:49:56.357087 2493 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:49:56.357162 kubelet[2493]: I0317 18:49:56.357156 2493 container_manager_linux.go:301] "Creating device plugin manager" Mar 17 18:49:56.357234 kubelet[2493]: I0317 18:49:56.357228 2493 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:49:56.357369 kubelet[2493]: I0317 18:49:56.357361 2493 kubelet.go:400] "Attempting to sync node with API server" Mar 17 18:49:56.357961 kubelet[2493]: I0317 18:49:56.357939 2493 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:49:56.358116 kubelet[2493]: I0317 18:49:56.358107 2493 kubelet.go:312] "Adding apiserver pod source" Mar 17 18:49:56.361070 kubelet[2493]: I0317 18:49:56.361047 2493 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:49:56.367015 kubelet[2493]: I0317 18:49:56.365370 2493 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:49:56.367015 kubelet[2493]: I0317 18:49:56.365580 2493 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:49:56.367015 kubelet[2493]: I0317 18:49:56.366009 2493 server.go:1264] "Started kubelet" Mar 17 18:49:56.366000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.366000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:56.366000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b76000 a1=c000b742a0 a2=c0003f3980 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:56.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:56.366000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.366000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:56.366000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000872ce0 a1=c000b742b8 a2=c000b76090 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:56.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:56.369491 kubelet[2493]: I0317 18:49:56.367908 2493 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:49:56.369491 kubelet[2493]: I0317 18:49:56.367978 2493 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:49:56.369491 kubelet[2493]: I0317 18:49:56.368020 2493 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:49:56.375946 kubelet[2493]: I0317 18:49:56.375185 2493 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:49:56.377477 kubelet[2493]: I0317 18:49:56.377198 2493 server.go:455] "Adding debug handlers to kubelet server" Mar 17 18:49:56.377698 kubelet[2493]: I0317 18:49:56.377634 2493 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:49:56.378657 kubelet[2493]: I0317 18:49:56.378230 2493 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:49:56.378657 kubelet[2493]: I0317 18:49:56.378297 2493 volume_manager.go:291] "Starting Kubelet Volume Manager" Mar 17 18:49:56.380456 kubelet[2493]: I0317 18:49:56.380274 2493 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 18:49:56.380586 kubelet[2493]: I0317 18:49:56.380465 2493 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:49:56.383019 kubelet[2493]: I0317 18:49:56.382442 2493 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:49:56.385350 kubelet[2493]: I0317 18:49:56.385313 2493 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:49:56.388766 kubelet[2493]: I0317 18:49:56.387723 2493 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:49:56.388766 kubelet[2493]: I0317 18:49:56.387755 2493 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:49:56.388766 kubelet[2493]: I0317 18:49:56.387775 2493 kubelet.go:2337] "Starting kubelet main sync loop" Mar 17 18:49:56.388766 kubelet[2493]: E0317 18:49:56.387817 2493 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 18:49:56.394155 kubelet[2493]: E0317 18:49:56.393060 2493 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:49:56.394155 kubelet[2493]: I0317 18:49:56.393433 2493 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:49:56.394155 kubelet[2493]: I0317 18:49:56.393448 2493 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:49:56.441235 kubelet[2493]: I0317 18:49:56.441204 2493 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:49:56.441235 kubelet[2493]: I0317 18:49:56.441223 2493 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:49:56.441235 kubelet[2493]: I0317 18:49:56.441245 2493 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:49:56.441473 kubelet[2493]: I0317 18:49:56.441404 2493 state_mem.go:88] "Updated default CPUSet" cpuSet="" Mar 17 18:49:56.441473 kubelet[2493]: I0317 18:49:56.441417 2493 state_mem.go:96] "Updated CPUSet assignments" assignments={} Mar 17 18:49:56.441473 kubelet[2493]: I0317 18:49:56.441440 2493 policy_none.go:49] "None policy: Start" Mar 17 18:49:56.441989 kubelet[2493]: I0317 18:49:56.441966 2493 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:49:56.442135 kubelet[2493]: I0317 18:49:56.442011 2493 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:49:56.442182 kubelet[2493]: I0317 18:49:56.442167 2493 state_mem.go:75] "Updated machine memory state" Mar 17 18:49:56.446276 kubelet[2493]: I0317 18:49:56.446257 2493 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:49:56.445000 audit[2493]: AVC avc: denied { mac_admin } for pid=2493 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:49:56.445000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:49:56.445000 audit[2493]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c96a20 a1=c000d71878 a2=c000c969f0 a3=25 items=0 ppid=1 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:49:56.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:49:56.446721 kubelet[2493]: I0317 18:49:56.446314 2493 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:49:56.446721 kubelet[2493]: I0317 18:49:56.446455 2493 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:49:56.446721 kubelet[2493]: I0317 18:49:56.446555 2493 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:49:56.481747 kubelet[2493]: I0317 18:49:56.481710 2493 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.488610 kubelet[2493]: I0317 18:49:56.488561 2493 topology_manager.go:215] "Topology Admit Handler" podUID="26c18f5d48a0ace9b30f9e7d6347355a" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.488728 kubelet[2493]: I0317 18:49:56.488669 2493 topology_manager.go:215] "Topology Admit Handler" podUID="1c21e7001aca2f90b23a1b68ad175e82" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.488775 kubelet[2493]: I0317 18:49:56.488740 2493 topology_manager.go:215] "Topology Admit Handler" podUID="85d249ae4a56220759aa47d86d732de2" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.494668 kubelet[2493]: W0317 18:49:56.494439 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 18:49:56.494796 kubelet[2493]: I0317 18:49:56.494702 2493 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.494796 kubelet[2493]: I0317 18:49:56.494760 2493 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.497917 kubelet[2493]: W0317 18:49:56.497897 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 18:49:56.498451 kubelet[2493]: W0317 18:49:56.498433 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 18:49:56.498619 kubelet[2493]: E0317 18:49:56.498590 2493 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.581953 kubelet[2493]: I0317 18:49:56.581840 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/85d249ae4a56220759aa47d86d732de2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-a-1304b8c80d\" (UID: \"85d249ae4a56220759aa47d86d732de2\") " pod="kube-system/kube-scheduler-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.581953 kubelet[2493]: I0317 18:49:56.581879 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.581953 kubelet[2493]: I0317 18:49:56.581907 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.581953 kubelet[2493]: I0317 18:49:56.581927 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.581953 kubelet[2493]: I0317 18:49:56.581948 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.582285 kubelet[2493]: I0317 18:49:56.581972 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.582285 kubelet[2493]: I0317 18:49:56.582007 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.582285 kubelet[2493]: I0317 18:49:56.582028 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/26c18f5d48a0ace9b30f9e7d6347355a-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" (UID: \"26c18f5d48a0ace9b30f9e7d6347355a\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:56.582285 kubelet[2493]: I0317 18:49:56.582050 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1c21e7001aca2f90b23a1b68ad175e82-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-a-1304b8c80d\" (UID: \"1c21e7001aca2f90b23a1b68ad175e82\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:57.361942 kubelet[2493]: I0317 18:49:57.361904 2493 apiserver.go:52] "Watching apiserver" Mar 17 18:49:57.381173 kubelet[2493]: I0317 18:49:57.381142 2493 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 18:49:57.473440 kubelet[2493]: W0317 18:49:57.473405 2493 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 18:49:57.473775 kubelet[2493]: E0317 18:49:57.473750 2493 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-a-1304b8c80d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" Mar 17 18:49:57.502857 kubelet[2493]: I0317 18:49:57.502788 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-a-1304b8c80d" podStartSLOduration=1.502767355 podStartE2EDuration="1.502767355s" podCreationTimestamp="2025-03-17 18:49:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:49:57.47484269 +0000 UTC m=+1.208211702" watchObservedRunningTime="2025-03-17 18:49:57.502767355 +0000 UTC m=+1.236136367" Mar 17 18:49:57.519810 kubelet[2493]: I0317 18:49:57.519750 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-a-1304b8c80d" podStartSLOduration=3.519728315 podStartE2EDuration="3.519728315s" podCreationTimestamp="2025-03-17 18:49:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:49:57.505843884 +0000 UTC m=+1.239212996" watchObservedRunningTime="2025-03-17 18:49:57.519728315 +0000 UTC m=+1.253097427" Mar 17 18:49:57.814000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8324 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Mar 17 18:49:57.814000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015c7240 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:57.814000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:58.867000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:58.867000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d37200 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:58.867000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:58.868000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:58.868000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f76bc0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:58.868000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:58.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:58.869000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d37920 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:58.869000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:49:58.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:49:58.871000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d37960 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:49:58.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:00.090470 kubelet[2493]: I0317 18:50:00.090404 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-a-1304b8c80d" podStartSLOduration=4.090381034 podStartE2EDuration="4.090381034s" podCreationTimestamp="2025-03-17 18:49:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:49:57.520822625 +0000 UTC m=+1.254191737" watchObservedRunningTime="2025-03-17 18:50:00.090381034 +0000 UTC m=+3.823750046" Mar 17 18:50:01.627175 sudo[1800]: pam_unix(sudo:session): session closed for user root Mar 17 18:50:01.626000 audit[1800]: USER_END pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:50:01.631203 kernel: kauditd_printk_skb: 335 callbacks suppressed Mar 17 18:50:01.631310 kernel: audit: type=1106 audit(1742237401.626:758): pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:50:01.647017 kernel: audit: type=1104 audit(1742237401.630:759): pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:50:01.630000 audit[1800]: CRED_DISP pid=1800 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:50:01.737600 sshd[1788]: pam_unix(sshd:session): session closed for user core Mar 17 18:50:01.737000 audit[1788]: USER_END pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:50:01.740381 systemd[1]: sshd@6-10.200.8.46:22-10.200.16.10:41386.service: Deactivated successfully. Mar 17 18:50:01.741242 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 18:50:01.741373 systemd[1]: session-9.scope: Consumed 5.080s CPU time. Mar 17 18:50:01.742878 systemd-logind[1381]: Session 9 logged out. Waiting for processes to exit. Mar 17 18:50:01.743896 systemd-logind[1381]: Removed session 9. Mar 17 18:50:01.737000 audit[1788]: CRED_DISP pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:50:01.771903 kernel: audit: type=1106 audit(1742237401.737:760): pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:50:01.771985 kernel: audit: type=1104 audit(1742237401.737:761): pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:50:01.772340 kernel: audit: type=1131 audit(1742237401.739:762): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.46:22-10.200.16.10:41386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:50:01.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.46:22-10.200.16.10:41386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:50:09.482683 kubelet[2493]: I0317 18:50:09.482652 2493 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Mar 17 18:50:09.483703 env[1393]: time="2025-03-17T18:50:09.483656766Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:50:09.484267 kubelet[2493]: I0317 18:50:09.484246 2493 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Mar 17 18:50:09.558727 kubelet[2493]: I0317 18:50:09.558676 2493 topology_manager.go:215] "Topology Admit Handler" podUID="2842981d-a391-4000-b877-6792fd35b4ed" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-2fpml" Mar 17 18:50:09.565477 kubelet[2493]: I0317 18:50:09.565446 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvpp5\" (UniqueName: \"kubernetes.io/projected/2842981d-a391-4000-b877-6792fd35b4ed-kube-api-access-rvpp5\") pod \"tigera-operator-7bc55997bb-2fpml\" (UID: \"2842981d-a391-4000-b877-6792fd35b4ed\") " pod="tigera-operator/tigera-operator-7bc55997bb-2fpml" Mar 17 18:50:09.565619 kubelet[2493]: I0317 18:50:09.565492 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2842981d-a391-4000-b877-6792fd35b4ed-var-lib-calico\") pod \"tigera-operator-7bc55997bb-2fpml\" (UID: \"2842981d-a391-4000-b877-6792fd35b4ed\") " pod="tigera-operator/tigera-operator-7bc55997bb-2fpml" Mar 17 18:50:09.566568 systemd[1]: Created slice kubepods-besteffort-pod2842981d_a391_4000_b877_6792fd35b4ed.slice. Mar 17 18:50:09.573591 kubelet[2493]: W0317 18:50:09.573562 2493 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.7-a-1304b8c80d" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-a-1304b8c80d' and this object Mar 17 18:50:09.573712 kubelet[2493]: E0317 18:50:09.573604 2493 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.7-a-1304b8c80d" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-a-1304b8c80d' and this object Mar 17 18:50:09.573842 kubelet[2493]: W0317 18:50:09.573824 2493 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.7-a-1304b8c80d" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-a-1304b8c80d' and this object Mar 17 18:50:09.573959 kubelet[2493]: E0317 18:50:09.573948 2493 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.7-a-1304b8c80d" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.7-a-1304b8c80d' and this object Mar 17 18:50:09.615588 kubelet[2493]: I0317 18:50:09.615534 2493 topology_manager.go:215] "Topology Admit Handler" podUID="78e72478-6efd-472b-b8ec-b41214f8fc69" podNamespace="kube-system" podName="kube-proxy-6kfhr" Mar 17 18:50:09.621596 systemd[1]: Created slice kubepods-besteffort-pod78e72478_6efd_472b_b8ec_b41214f8fc69.slice. Mar 17 18:50:09.665851 kubelet[2493]: I0317 18:50:09.665812 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/78e72478-6efd-472b-b8ec-b41214f8fc69-kube-proxy\") pod \"kube-proxy-6kfhr\" (UID: \"78e72478-6efd-472b-b8ec-b41214f8fc69\") " pod="kube-system/kube-proxy-6kfhr" Mar 17 18:50:09.666192 kubelet[2493]: I0317 18:50:09.666169 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/78e72478-6efd-472b-b8ec-b41214f8fc69-xtables-lock\") pod \"kube-proxy-6kfhr\" (UID: \"78e72478-6efd-472b-b8ec-b41214f8fc69\") " pod="kube-system/kube-proxy-6kfhr" Mar 17 18:50:09.666373 kubelet[2493]: I0317 18:50:09.666356 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/78e72478-6efd-472b-b8ec-b41214f8fc69-lib-modules\") pod \"kube-proxy-6kfhr\" (UID: \"78e72478-6efd-472b-b8ec-b41214f8fc69\") " pod="kube-system/kube-proxy-6kfhr" Mar 17 18:50:09.666496 kubelet[2493]: I0317 18:50:09.666474 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcdmk\" (UniqueName: \"kubernetes.io/projected/78e72478-6efd-472b-b8ec-b41214f8fc69-kube-api-access-jcdmk\") pod \"kube-proxy-6kfhr\" (UID: \"78e72478-6efd-472b-b8ec-b41214f8fc69\") " pod="kube-system/kube-proxy-6kfhr" Mar 17 18:50:09.925723 env[1393]: time="2025-03-17T18:50:09.925679964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6kfhr,Uid:78e72478-6efd-472b-b8ec-b41214f8fc69,Namespace:kube-system,Attempt:0,}" Mar 17 18:50:09.960230 env[1393]: time="2025-03-17T18:50:09.960158814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:09.960429 env[1393]: time="2025-03-17T18:50:09.960198414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:09.960429 env[1393]: time="2025-03-17T18:50:09.960216014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:09.960429 env[1393]: time="2025-03-17T18:50:09.960352515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152 pid=2577 runtime=io.containerd.runc.v2 Mar 17 18:50:09.976571 systemd[1]: Started cri-containerd-33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152.scope. Mar 17 18:50:09.985856 systemd[1]: run-containerd-runc-k8s.io-33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152-runc.nmzR9U.mount: Deactivated successfully. Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.026273 kernel: audit: type=1400 audit(1742237409.997:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.026403 kernel: audit: type=1400 audit(1742237409.997:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.038668 kernel: audit: type=1400 audit(1742237409.997:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.052050 kernel: audit: type=1400 audit(1742237409.997:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.065024 kernel: audit: type=1400 audit(1742237409.997:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.088488 kernel: audit: type=1400 audit(1742237409.997:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.088885 kernel: audit: type=1400 audit(1742237409.997:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.088937 kernel: audit: type=1400 audit(1742237409.997:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.126484 kernel: audit: type=1400 audit(1742237409.997:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.126590 kernel: audit: type=1400 audit(1742237409.998:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:09.998000 audit: BPF prog-id=101 op=LOAD Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2577 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623139346333366434313435613036346335383734336362626434 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2577 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623139346333366434313435613036346335383734336362626434 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.012000 audit: BPF prog-id=102 op=LOAD Mar 17 18:50:10.012000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024c80 items=0 ppid=2577 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623139346333366434313435613036346335383734336362626434 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.039000 audit: BPF prog-id=103 op=LOAD Mar 17 18:50:10.039000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024cc8 items=0 ppid=2577 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623139346333366434313435613036346335383734336362626434 Mar 17 18:50:10.063000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:50:10.063000 audit: BPF prog-id=102 op=UNLOAD Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.063000 audit: BPF prog-id=104 op=LOAD Mar 17 18:50:10.063000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000250d8 items=0 ppid=2577 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333623139346333366434313435613036346335383734336362626434 Mar 17 18:50:10.131170 env[1393]: time="2025-03-17T18:50:10.131127531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6kfhr,Uid:78e72478-6efd-472b-b8ec-b41214f8fc69,Namespace:kube-system,Attempt:0,} returns sandbox id \"33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152\"" Mar 17 18:50:10.134683 env[1393]: time="2025-03-17T18:50:10.134645156Z" level=info msg="CreateContainer within sandbox \"33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:50:10.182682 env[1393]: time="2025-03-17T18:50:10.180296879Z" level=info msg="CreateContainer within sandbox \"33b194c36d4145a064c58743cbbd4ebb775dcce4d74281334d1f129e80e0c152\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9b51de4f232486c6fc58e34610ca6495f20b79d816353852520a3609349bdbc3\"" Mar 17 18:50:10.182958 env[1393]: time="2025-03-17T18:50:10.182875898Z" level=info msg="StartContainer for \"9b51de4f232486c6fc58e34610ca6495f20b79d816353852520a3609349bdbc3\"" Mar 17 18:50:10.200730 systemd[1]: Started cri-containerd-9b51de4f232486c6fc58e34610ca6495f20b79d816353852520a3609349bdbc3.scope. Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f20185867c8 items=0 ppid=2577 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353164653466323332343836633666633538653334363130636136 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit: BPF prog-id=105 op=LOAD Mar 17 18:50:10.217000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000337bd8 items=0 ppid=2577 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353164653466323332343836633666633538653334363130636136 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit: BPF prog-id=106 op=LOAD Mar 17 18:50:10.217000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000337c28 items=0 ppid=2577 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353164653466323332343836633666633538653334363130636136 Mar 17 18:50:10.217000 audit: BPF prog-id=106 op=UNLOAD Mar 17 18:50:10.217000 audit: BPF prog-id=105 op=UNLOAD Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:10.217000 audit: BPF prog-id=107 op=LOAD Mar 17 18:50:10.217000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000337cb8 items=0 ppid=2577 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353164653466323332343836633666633538653334363130636136 Mar 17 18:50:10.239779 env[1393]: time="2025-03-17T18:50:10.239730201Z" level=info msg="StartContainer for \"9b51de4f232486c6fc58e34610ca6495f20b79d816353852520a3609349bdbc3\" returns successfully" Mar 17 18:50:10.294000 audit[2670]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.294000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd45eee8e0 a2=0 a3=7ffd45eee8cc items=0 ppid=2630 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:50:10.296000 audit[2671]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.296000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa0529c80 a2=0 a3=7fffa0529c6c items=0 ppid=2630 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:50:10.296000 audit[2672]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.296000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc779b5d50 a2=0 a3=7ffc779b5d3c items=0 ppid=2630 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:50:10.298000 audit[2674]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.298000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdaddb140 a2=0 a3=7ffcdaddb12c items=0 ppid=2630 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:50:10.299000 audit[2673]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.299000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb742c5d0 a2=0 a3=f2f33e319d491fc9 items=0 ppid=2630 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:50:10.304000 audit[2675]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.304000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4c8fd750 a2=0 a3=7fff4c8fd73c items=0 ppid=2630 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:50:10.402000 audit[2676]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.402000 audit[2676]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6ff0f610 a2=0 a3=7fff6ff0f5fc items=0 ppid=2630 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:50:10.405000 audit[2678]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.405000 audit[2678]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc9a022430 a2=0 a3=7ffc9a02241c items=0 ppid=2630 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:50:10.409000 audit[2681]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.409000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe4b5e0a40 a2=0 a3=7ffe4b5e0a2c items=0 ppid=2630 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:50:10.410000 audit[2682]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.410000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0863eab0 a2=0 a3=7ffd0863ea9c items=0 ppid=2630 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:50:10.412000 audit[2684]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.412000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcacc97fe0 a2=0 a3=7ffcacc97fcc items=0 ppid=2630 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:50:10.414000 audit[2685]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.414000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb316eb70 a2=0 a3=7ffcb316eb5c items=0 ppid=2630 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:50:10.418000 audit[2687]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.418000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9d7e4c60 a2=0 a3=7ffe9d7e4c4c items=0 ppid=2630 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:50:10.421000 audit[2690]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.421000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe5c114150 a2=0 a3=7ffe5c11413c items=0 ppid=2630 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:50:10.422000 audit[2691]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.422000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe53d4b9e0 a2=0 a3=7ffe53d4b9cc items=0 ppid=2630 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:50:10.425000 audit[2693]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.425000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9e929d30 a2=0 a3=7ffc9e929d1c items=0 ppid=2630 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:50:10.426000 audit[2694]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.426000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd575bb370 a2=0 a3=7ffd575bb35c items=0 ppid=2630 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:50:10.430000 audit[2696]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.430000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff96bf3c00 a2=0 a3=7fff96bf3bec items=0 ppid=2630 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:50:10.436000 audit[2699]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.436000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7d18fa00 a2=0 a3=7fff7d18f9ec items=0 ppid=2630 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:50:10.442000 audit[2702]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.442000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff89a80ee0 a2=0 a3=7fff89a80ecc items=0 ppid=2630 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:50:10.443000 audit[2703]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.443000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffd1a68ba0 a2=0 a3=7fffd1a68b8c items=0 ppid=2630 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:50:10.447000 audit[2705]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.447000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffec0e309f0 a2=0 a3=7ffec0e309dc items=0 ppid=2630 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:50:10.451000 audit[2708]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.451000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff870413e0 a2=0 a3=7fff870413cc items=0 ppid=2630 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:50:10.452000 audit[2709]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.452000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaf8ccc00 a2=0 a3=7ffeaf8ccbec items=0 ppid=2630 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:50:10.456000 audit[2711]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:50:10.456000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdd2f650a0 a2=0 a3=7ffdd2f6508c items=0 ppid=2630 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:50:10.465507 kubelet[2493]: I0317 18:50:10.465458 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6kfhr" podStartSLOduration=1.4654376 podStartE2EDuration="1.4654376s" podCreationTimestamp="2025-03-17 18:50:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:50:10.464578294 +0000 UTC m=+14.197947306" watchObservedRunningTime="2025-03-17 18:50:10.4654376 +0000 UTC m=+14.198806612" Mar 17 18:50:10.535000 audit[2717]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:10.535000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdbeddda40 a2=0 a3=7ffdbeddda2c items=0 ppid=2630 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:10.559000 audit[2717]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:10.559000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdbeddda40 a2=0 a3=7ffdbeddda2c items=0 ppid=2630 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:10.561000 audit[2722]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.561000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd26d19bb0 a2=0 a3=7ffd26d19b9c items=0 ppid=2630 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:50:10.564000 audit[2724]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.564000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe94f9c9b0 a2=0 a3=7ffe94f9c99c items=0 ppid=2630 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:50:10.568000 audit[2727]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.568000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe94b13de0 a2=0 a3=7ffe94b13dcc items=0 ppid=2630 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:50:10.569000 audit[2728]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.569000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe70fdae30 a2=0 a3=7ffe70fdae1c items=0 ppid=2630 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:50:10.572000 audit[2730]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.572000 audit[2730]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc74f393b0 a2=0 a3=7ffc74f3939c items=0 ppid=2630 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:50:10.573000 audit[2731]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.573000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff399acc10 a2=0 a3=7fff399acbfc items=0 ppid=2630 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:50:10.576000 audit[2733]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.576000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffae74c0d0 a2=0 a3=7fffae74c0bc items=0 ppid=2630 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:50:10.579000 audit[2736]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.579000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe19504f60 a2=0 a3=7ffe19504f4c items=0 ppid=2630 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:50:10.580000 audit[2737]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.580000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda9c036e0 a2=0 a3=7ffda9c036cc items=0 ppid=2630 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:50:10.583000 audit[2739]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.583000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd98b29010 a2=0 a3=7ffd98b28ffc items=0 ppid=2630 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:50:10.584000 audit[2740]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.584000 audit[2740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecd94edc0 a2=0 a3=7ffecd94edac items=0 ppid=2630 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:50:10.587000 audit[2742]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.587000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe95363880 a2=0 a3=7ffe9536386c items=0 ppid=2630 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:50:10.591000 audit[2745]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.591000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe777cd0b0 a2=0 a3=7ffe777cd09c items=0 ppid=2630 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:50:10.594000 audit[2748]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.594000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0c718a30 a2=0 a3=7fff0c718a1c items=0 ppid=2630 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:50:10.596000 audit[2749]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.596000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe3bd0f110 a2=0 a3=7ffe3bd0f0fc items=0 ppid=2630 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:50:10.598000 audit[2751]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.598000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd3cf600f0 a2=0 a3=7ffd3cf600dc items=0 ppid=2630 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:50:10.601000 audit[2754]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.601000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff37064820 a2=0 a3=7fff3706480c items=0 ppid=2630 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:50:10.602000 audit[2755]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.602000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc199b9a80 a2=0 a3=7ffc199b9a6c items=0 ppid=2630 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:50:10.605000 audit[2757]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.605000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1ba53ab0 a2=0 a3=7ffe1ba53a9c items=0 ppid=2630 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:50:10.606000 audit[2758]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.606000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff33a27b70 a2=0 a3=7fff33a27b5c items=0 ppid=2630 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.606000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:50:10.608000 audit[2760]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.608000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc35403f0 a2=0 a3=7ffcc35403dc items=0 ppid=2630 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:50:10.612000 audit[2763]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:50:10.612000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7c3a4870 a2=0 a3=7ffe7c3a485c items=0 ppid=2630 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:50:10.615000 audit[2765]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:50:10.615000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc0af49e70 a2=0 a3=7ffc0af49e5c items=0 ppid=2630 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.615000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:10.615000 audit[2765]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:50:10.615000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc0af49e70 a2=0 a3=7ffc0af49e5c items=0 ppid=2630 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:10.615000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:10.677234 kubelet[2493]: E0317 18:50:10.677171 2493 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Mar 17 18:50:10.677234 kubelet[2493]: E0317 18:50:10.677213 2493 projected.go:200] Error preparing data for projected volume kube-api-access-rvpp5 for pod tigera-operator/tigera-operator-7bc55997bb-2fpml: failed to sync configmap cache: timed out waiting for the condition Mar 17 18:50:10.677754 kubelet[2493]: E0317 18:50:10.677293 2493 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2842981d-a391-4000-b877-6792fd35b4ed-kube-api-access-rvpp5 podName:2842981d-a391-4000-b877-6792fd35b4ed nodeName:}" failed. No retries permitted until 2025-03-17 18:50:11.1772635 +0000 UTC m=+14.910632512 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rvpp5" (UniqueName: "kubernetes.io/projected/2842981d-a391-4000-b877-6792fd35b4ed-kube-api-access-rvpp5") pod "tigera-operator-7bc55997bb-2fpml" (UID: "2842981d-a391-4000-b877-6792fd35b4ed") : failed to sync configmap cache: timed out waiting for the condition Mar 17 18:50:11.373121 env[1393]: time="2025-03-17T18:50:11.373072176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2fpml,Uid:2842981d-a391-4000-b877-6792fd35b4ed,Namespace:tigera-operator,Attempt:0,}" Mar 17 18:50:11.418050 env[1393]: time="2025-03-17T18:50:11.417788186Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:11.418050 env[1393]: time="2025-03-17T18:50:11.417825987Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:11.418050 env[1393]: time="2025-03-17T18:50:11.417840387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:11.418050 env[1393]: time="2025-03-17T18:50:11.417956188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3df3602e195f6ee32b018635644d5075df510e55d1ba6be8dee7cb3bd10845ed pid=2774 runtime=io.containerd.runc.v2 Mar 17 18:50:11.442962 systemd[1]: Started cri-containerd-3df3602e195f6ee32b018635644d5075df510e55d1ba6be8dee7cb3bd10845ed.scope. Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.463000 audit: BPF prog-id=108 op=LOAD Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:11.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663336303265313935663665653332623031383633353634346435 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:11.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663336303265313935663665653332623031383633353634346435 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit: BPF prog-id=109 op=LOAD Mar 17 18:50:11.464000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002eec90 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:11.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663336303265313935663665653332623031383633353634346435 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit: BPF prog-id=110 op=LOAD Mar 17 18:50:11.464000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002eecd8 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:11.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663336303265313935663665653332623031383633353634346435 Mar 17 18:50:11.464000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:50:11.464000 audit: BPF prog-id=109 op=UNLOAD Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:11.464000 audit: BPF prog-id=111 op=LOAD Mar 17 18:50:11.464000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002ef0e8 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:11.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663336303265313935663665653332623031383633353634346435 Mar 17 18:50:11.492240 env[1393]: time="2025-03-17T18:50:11.492194303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-2fpml,Uid:2842981d-a391-4000-b877-6792fd35b4ed,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"3df3602e195f6ee32b018635644d5075df510e55d1ba6be8dee7cb3bd10845ed\"" Mar 17 18:50:11.494607 env[1393]: time="2025-03-17T18:50:11.494565719Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Mar 17 18:50:13.357779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3684901416.mount: Deactivated successfully. Mar 17 18:50:14.191770 env[1393]: time="2025-03-17T18:50:14.191719840Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:14.197935 env[1393]: time="2025-03-17T18:50:14.197834779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:14.202678 env[1393]: time="2025-03-17T18:50:14.202646611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:14.206586 env[1393]: time="2025-03-17T18:50:14.206553736Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:14.207176 env[1393]: time="2025-03-17T18:50:14.207147440Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Mar 17 18:50:14.210574 env[1393]: time="2025-03-17T18:50:14.210543662Z" level=info msg="CreateContainer within sandbox \"3df3602e195f6ee32b018635644d5075df510e55d1ba6be8dee7cb3bd10845ed\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Mar 17 18:50:14.235291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount388256087.mount: Deactivated successfully. Mar 17 18:50:14.249296 env[1393]: time="2025-03-17T18:50:14.249249215Z" level=info msg="CreateContainer within sandbox \"3df3602e195f6ee32b018635644d5075df510e55d1ba6be8dee7cb3bd10845ed\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8edb88101bb5445805eded2c5e7ee458cdab4f96a1fdfdb22a583c0f23d5368c\"" Mar 17 18:50:14.251124 env[1393]: time="2025-03-17T18:50:14.249940820Z" level=info msg="StartContainer for \"8edb88101bb5445805eded2c5e7ee458cdab4f96a1fdfdb22a583c0f23d5368c\"" Mar 17 18:50:14.266866 systemd[1]: Started cri-containerd-8edb88101bb5445805eded2c5e7ee458cdab4f96a1fdfdb22a583c0f23d5368c.scope. Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.286000 audit: BPF prog-id=112 op=LOAD Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2774 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:14.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646238383130316262353434353830356564656432633565376565 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2774 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:14.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646238383130316262353434353830356564656432633565376565 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit: BPF prog-id=113 op=LOAD Mar 17 18:50:14.287000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00038bdc0 items=0 ppid=2774 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:14.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646238383130316262353434353830356564656432633565376565 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit: BPF prog-id=114 op=LOAD Mar 17 18:50:14.287000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00038be08 items=0 ppid=2774 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:14.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646238383130316262353434353830356564656432633565376565 Mar 17 18:50:14.287000 audit: BPF prog-id=114 op=UNLOAD Mar 17 18:50:14.287000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:14.287000 audit: BPF prog-id=115 op=LOAD Mar 17 18:50:14.287000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ea218 items=0 ppid=2774 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:14.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646238383130316262353434353830356564656432633565376565 Mar 17 18:50:14.313019 env[1393]: time="2025-03-17T18:50:14.311713923Z" level=info msg="StartContainer for \"8edb88101bb5445805eded2c5e7ee458cdab4f96a1fdfdb22a583c0f23d5368c\" returns successfully" Mar 17 18:50:16.401731 kubelet[2493]: I0317 18:50:16.401673 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-2fpml" podStartSLOduration=4.686928406 podStartE2EDuration="7.401652841s" podCreationTimestamp="2025-03-17 18:50:09 +0000 UTC" firstStartedPulling="2025-03-17 18:50:11.493620213 +0000 UTC m=+15.226989225" lastFinishedPulling="2025-03-17 18:50:14.208344648 +0000 UTC m=+17.941713660" observedRunningTime="2025-03-17 18:50:14.471016163 +0000 UTC m=+18.204385275" watchObservedRunningTime="2025-03-17 18:50:16.401652841 +0000 UTC m=+20.135021853" Mar 17 18:50:17.173029 kernel: kauditd_printk_skb: 357 callbacks suppressed Mar 17 18:50:17.173185 kernel: audit: type=1325 audit(1742237417.162:874): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.162000 audit[2846]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.162000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc12166f00 a2=0 a3=7ffc12166eec items=0 ppid=2630 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.198154 kernel: audit: type=1300 audit(1742237417.162:874): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc12166f00 a2=0 a3=7ffc12166eec items=0 ppid=2630 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.198260 kernel: audit: type=1327 audit(1742237417.162:874): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.178000 audit[2846]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.217013 kernel: audit: type=1325 audit(1742237417.178:875): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.217095 kernel: audit: type=1300 audit(1742237417.178:875): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc12166f00 a2=0 a3=0 items=0 ppid=2630 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.178000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc12166f00 a2=0 a3=0 items=0 ppid=2630 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.240545 kernel: audit: type=1327 audit(1742237417.178:875): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.238000 audit[2848]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.253454 kernel: audit: type=1325 audit(1742237417.238:876): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.253543 kernel: audit: type=1300 audit(1742237417.238:876): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb03466b0 a2=0 a3=7ffdb034669c items=0 ppid=2630 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.238000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb03466b0 a2=0 a3=7ffdb034669c items=0 ppid=2630 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.281961 kernel: audit: type=1327 audit(1742237417.238:876): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.282000 audit[2848]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.282000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb03466b0 a2=0 a3=0 items=0 ppid=2630 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.293139 kernel: audit: type=1325 audit(1742237417.282:877): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:17.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:17.367462 kubelet[2493]: I0317 18:50:17.367411 2493 topology_manager.go:215] "Topology Admit Handler" podUID="bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5" podNamespace="calico-system" podName="calico-typha-688bd55b76-r96kj" Mar 17 18:50:17.374773 systemd[1]: Created slice kubepods-besteffort-podbb1aac8e_dad7_4a95_8d5e_b3b2a3d77ed5.slice. Mar 17 18:50:17.483887 kubelet[2493]: I0317 18:50:17.483756 2493 topology_manager.go:215] "Topology Admit Handler" podUID="d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7" podNamespace="calico-system" podName="calico-node-vf4rw" Mar 17 18:50:17.491340 systemd[1]: Created slice kubepods-besteffort-podd20cdc94_0c4e_46d9_aba5_b95a8c8f72f7.slice. Mar 17 18:50:17.518447 kubelet[2493]: I0317 18:50:17.518400 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9k4j4\" (UniqueName: \"kubernetes.io/projected/bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5-kube-api-access-9k4j4\") pod \"calico-typha-688bd55b76-r96kj\" (UID: \"bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5\") " pod="calico-system/calico-typha-688bd55b76-r96kj" Mar 17 18:50:17.518683 kubelet[2493]: I0317 18:50:17.518452 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5-tigera-ca-bundle\") pod \"calico-typha-688bd55b76-r96kj\" (UID: \"bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5\") " pod="calico-system/calico-typha-688bd55b76-r96kj" Mar 17 18:50:17.518683 kubelet[2493]: I0317 18:50:17.518497 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5-typha-certs\") pod \"calico-typha-688bd55b76-r96kj\" (UID: \"bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5\") " pod="calico-system/calico-typha-688bd55b76-r96kj" Mar 17 18:50:17.602069 kubelet[2493]: I0317 18:50:17.602019 2493 topology_manager.go:215] "Topology Admit Handler" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" podNamespace="calico-system" podName="csi-node-driver-dnzzl" Mar 17 18:50:17.602463 kubelet[2493]: E0317 18:50:17.602432 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:17.619709 kubelet[2493]: I0317 18:50:17.619678 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-policysync\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.619961 kubelet[2493]: I0317 18:50:17.619937 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-node-certs\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620091 kubelet[2493]: I0317 18:50:17.620052 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-var-run-calico\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620091 kubelet[2493]: I0317 18:50:17.620084 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wblrk\" (UniqueName: \"kubernetes.io/projected/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-kube-api-access-wblrk\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620193 kubelet[2493]: I0317 18:50:17.620161 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-xtables-lock\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620245 kubelet[2493]: I0317 18:50:17.620215 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-cni-log-dir\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620292 kubelet[2493]: I0317 18:50:17.620275 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-lib-modules\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620339 kubelet[2493]: I0317 18:50:17.620301 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-cni-bin-dir\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620339 kubelet[2493]: I0317 18:50:17.620328 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-cni-net-dir\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620423 kubelet[2493]: I0317 18:50:17.620373 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-tigera-ca-bundle\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620423 kubelet[2493]: I0317 18:50:17.620398 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-var-lib-calico\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.620517 kubelet[2493]: I0317 18:50:17.620421 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7-flexvol-driver-host\") pod \"calico-node-vf4rw\" (UID: \"d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7\") " pod="calico-system/calico-node-vf4rw" Mar 17 18:50:17.680169 env[1393]: time="2025-03-17T18:50:17.680109284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688bd55b76-r96kj,Uid:bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5,Namespace:calico-system,Attempt:0,}" Mar 17 18:50:17.721113 kubelet[2493]: I0317 18:50:17.721070 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e7d868b1-5177-4620-8f50-dbb00237cb1d-socket-dir\") pod \"csi-node-driver-dnzzl\" (UID: \"e7d868b1-5177-4620-8f50-dbb00237cb1d\") " pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:17.721283 kubelet[2493]: I0317 18:50:17.721136 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5t7l\" (UniqueName: \"kubernetes.io/projected/e7d868b1-5177-4620-8f50-dbb00237cb1d-kube-api-access-s5t7l\") pod \"csi-node-driver-dnzzl\" (UID: \"e7d868b1-5177-4620-8f50-dbb00237cb1d\") " pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:17.721283 kubelet[2493]: I0317 18:50:17.721179 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e7d868b1-5177-4620-8f50-dbb00237cb1d-kubelet-dir\") pod \"csi-node-driver-dnzzl\" (UID: \"e7d868b1-5177-4620-8f50-dbb00237cb1d\") " pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:17.721283 kubelet[2493]: I0317 18:50:17.721202 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e7d868b1-5177-4620-8f50-dbb00237cb1d-registration-dir\") pod \"csi-node-driver-dnzzl\" (UID: \"e7d868b1-5177-4620-8f50-dbb00237cb1d\") " pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:17.721423 kubelet[2493]: I0317 18:50:17.721309 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e7d868b1-5177-4620-8f50-dbb00237cb1d-varrun\") pod \"csi-node-driver-dnzzl\" (UID: \"e7d868b1-5177-4620-8f50-dbb00237cb1d\") " pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:17.723458 kubelet[2493]: E0317 18:50:17.723432 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.723458 kubelet[2493]: W0317 18:50:17.723456 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.723651 kubelet[2493]: E0317 18:50:17.723490 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.723763 kubelet[2493]: E0317 18:50:17.723745 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.723834 kubelet[2493]: W0317 18:50:17.723765 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.723834 kubelet[2493]: E0317 18:50:17.723788 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.731280 kubelet[2493]: E0317 18:50:17.729703 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.731280 kubelet[2493]: W0317 18:50:17.729724 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.731280 kubelet[2493]: E0317 18:50:17.729743 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.731280 kubelet[2493]: E0317 18:50:17.730047 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.731280 kubelet[2493]: W0317 18:50:17.730058 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.731280 kubelet[2493]: E0317 18:50:17.730074 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.738125 env[1393]: time="2025-03-17T18:50:17.736380631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:17.738308 env[1393]: time="2025-03-17T18:50:17.738274142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:17.738407 env[1393]: time="2025-03-17T18:50:17.738386443Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:17.738638 env[1393]: time="2025-03-17T18:50:17.738611045Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9151bd593ea02788a7e3a06dd76c1801cb8cd0b4891b23137107cabac69e89e9 pid=2863 runtime=io.containerd.runc.v2 Mar 17 18:50:17.747694 kubelet[2493]: E0317 18:50:17.747669 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.747799 kubelet[2493]: W0317 18:50:17.747694 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.747799 kubelet[2493]: E0317 18:50:17.747721 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.749482 kubelet[2493]: E0317 18:50:17.749445 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.749482 kubelet[2493]: W0317 18:50:17.749482 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.749661 kubelet[2493]: E0317 18:50:17.749644 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.749901 kubelet[2493]: E0317 18:50:17.749888 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.750022 kubelet[2493]: W0317 18:50:17.749987 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.750107 kubelet[2493]: E0317 18:50:17.750097 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.761361 systemd[1]: Started cri-containerd-9151bd593ea02788a7e3a06dd76c1801cb8cd0b4891b23137107cabac69e89e9.scope. Mar 17 18:50:17.765234 kubelet[2493]: E0317 18:50:17.765160 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.765234 kubelet[2493]: W0317 18:50:17.765177 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.765234 kubelet[2493]: E0317 18:50:17.765195 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.795168 env[1393]: time="2025-03-17T18:50:17.795121292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vf4rw,Uid:d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7,Namespace:calico-system,Attempt:0,}" Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.800000 audit: BPF prog-id=116 op=LOAD Mar 17 18:50:17.801000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.801000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353162643539336561303237383861376533613036646437366331 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353162643539336561303237383861376533613036646437366331 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.802000 audit: BPF prog-id=117 op=LOAD Mar 17 18:50:17.802000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025c60 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353162643539336561303237383861376533613036646437366331 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.803000 audit: BPF prog-id=118 op=LOAD Mar 17 18:50:17.803000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000025ca8 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353162643539336561303237383861376533613036646437366331 Mar 17 18:50:17.804000 audit: BPF prog-id=118 op=UNLOAD Mar 17 18:50:17.804000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.804000 audit: BPF prog-id=119 op=LOAD Mar 17 18:50:17.804000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00036e0b8 items=0 ppid=2863 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353162643539336561303237383861376533613036646437366331 Mar 17 18:50:17.822534 kubelet[2493]: E0317 18:50:17.822507 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.822534 kubelet[2493]: W0317 18:50:17.822531 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.822736 kubelet[2493]: E0317 18:50:17.822557 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.822912 kubelet[2493]: E0317 18:50:17.822896 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.822984 kubelet[2493]: W0317 18:50:17.822913 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.822984 kubelet[2493]: E0317 18:50:17.822934 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.823218 kubelet[2493]: E0317 18:50:17.823200 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.823309 kubelet[2493]: W0317 18:50:17.823223 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.823309 kubelet[2493]: E0317 18:50:17.823243 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.823475 kubelet[2493]: E0317 18:50:17.823459 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.823532 kubelet[2493]: W0317 18:50:17.823476 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.823532 kubelet[2493]: E0317 18:50:17.823500 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.823774 kubelet[2493]: E0317 18:50:17.823753 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.823853 kubelet[2493]: W0317 18:50:17.823777 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.823853 kubelet[2493]: E0317 18:50:17.823793 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.824059 kubelet[2493]: E0317 18:50:17.824043 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.824134 kubelet[2493]: W0317 18:50:17.824064 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.824181 kubelet[2493]: E0317 18:50:17.824157 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.824319 kubelet[2493]: E0317 18:50:17.824306 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.824319 kubelet[2493]: W0317 18:50:17.824319 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.824426 kubelet[2493]: E0317 18:50:17.824412 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.824572 kubelet[2493]: E0317 18:50:17.824551 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.824639 kubelet[2493]: W0317 18:50:17.824575 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.824747 kubelet[2493]: E0317 18:50:17.824715 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.824806 kubelet[2493]: E0317 18:50:17.824774 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.824806 kubelet[2493]: W0317 18:50:17.824784 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.824892 kubelet[2493]: E0317 18:50:17.824868 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.825032 kubelet[2493]: E0317 18:50:17.825019 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.825104 kubelet[2493]: W0317 18:50:17.825032 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.825166 kubelet[2493]: E0317 18:50:17.825118 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.825276 kubelet[2493]: E0317 18:50:17.825256 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.825359 kubelet[2493]: W0317 18:50:17.825276 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.825359 kubelet[2493]: E0317 18:50:17.825293 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.825513 kubelet[2493]: E0317 18:50:17.825502 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.825566 kubelet[2493]: W0317 18:50:17.825512 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.825613 kubelet[2493]: E0317 18:50:17.825601 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.825782 kubelet[2493]: E0317 18:50:17.825761 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.825782 kubelet[2493]: W0317 18:50:17.825777 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.825902 kubelet[2493]: E0317 18:50:17.825860 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.826019 kubelet[2493]: E0317 18:50:17.826002 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.826019 kubelet[2493]: W0317 18:50:17.826016 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.826145 kubelet[2493]: E0317 18:50:17.826103 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.826266 kubelet[2493]: E0317 18:50:17.826242 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.826266 kubelet[2493]: W0317 18:50:17.826263 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.826383 kubelet[2493]: E0317 18:50:17.826344 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.826490 kubelet[2493]: E0317 18:50:17.826474 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.826549 kubelet[2493]: W0317 18:50:17.826494 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.826738 kubelet[2493]: E0317 18:50:17.826608 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.826810 kubelet[2493]: E0317 18:50:17.826742 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.826810 kubelet[2493]: W0317 18:50:17.826752 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.826810 kubelet[2493]: E0317 18:50:17.826769 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.826989 kubelet[2493]: E0317 18:50:17.826971 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.827051 kubelet[2493]: W0317 18:50:17.826990 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.827051 kubelet[2493]: E0317 18:50:17.827037 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.827402 kubelet[2493]: E0317 18:50:17.827382 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.827402 kubelet[2493]: W0317 18:50:17.827399 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.827649 kubelet[2493]: E0317 18:50:17.827561 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.827649 kubelet[2493]: E0317 18:50:17.827573 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.827649 kubelet[2493]: W0317 18:50:17.827582 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.827649 kubelet[2493]: E0317 18:50:17.827595 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.827862 kubelet[2493]: E0317 18:50:17.827759 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.827862 kubelet[2493]: W0317 18:50:17.827769 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.827862 kubelet[2493]: E0317 18:50:17.827843 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.828046 kubelet[2493]: E0317 18:50:17.827973 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.828046 kubelet[2493]: W0317 18:50:17.827983 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.828158 kubelet[2493]: E0317 18:50:17.828078 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.828541 kubelet[2493]: E0317 18:50:17.828210 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.828541 kubelet[2493]: W0317 18:50:17.828221 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.828541 kubelet[2493]: E0317 18:50:17.828236 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.832192 kubelet[2493]: E0317 18:50:17.832169 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.832192 kubelet[2493]: W0317 18:50:17.832191 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.832323 kubelet[2493]: E0317 18:50:17.832211 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.832452 kubelet[2493]: E0317 18:50:17.832438 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.832522 kubelet[2493]: W0317 18:50:17.832454 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.832522 kubelet[2493]: E0317 18:50:17.832469 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.844529 env[1393]: time="2025-03-17T18:50:17.844463096Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:17.844690 env[1393]: time="2025-03-17T18:50:17.844664298Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:17.844800 env[1393]: time="2025-03-17T18:50:17.844779498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:17.845151 env[1393]: time="2025-03-17T18:50:17.845080100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6 pid=2927 runtime=io.containerd.runc.v2 Mar 17 18:50:17.852094 kubelet[2493]: E0317 18:50:17.852075 2493 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:50:17.852206 kubelet[2493]: W0317 18:50:17.852193 2493 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:50:17.852291 kubelet[2493]: E0317 18:50:17.852278 2493 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:50:17.874985 systemd[1]: Started cri-containerd-6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6.scope. Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.901000 audit: BPF prog-id=120 op=LOAD Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2927 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383766626635373734333863353432316533636262376133633131 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2927 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383766626635373734333863353432316533636262376133633131 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit: BPF prog-id=121 op=LOAD Mar 17 18:50:17.902000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002d5f80 items=0 ppid=2927 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383766626635373734333863353432316533636262376133633131 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit: BPF prog-id=122 op=LOAD Mar 17 18:50:17.902000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002d5fc8 items=0 ppid=2927 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383766626635373734333863353432316533636262376133633131 Mar 17 18:50:17.902000 audit: BPF prog-id=122 op=UNLOAD Mar 17 18:50:17.902000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { perfmon } for pid=2939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit[2939]: AVC avc: denied { bpf } for pid=2939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:17.902000 audit: BPF prog-id=123 op=LOAD Mar 17 18:50:17.902000 audit[2939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b83d8 items=0 ppid=2927 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:17.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664383766626635373734333863353432316533636262376133633131 Mar 17 18:50:17.917030 env[1393]: time="2025-03-17T18:50:17.916963543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vf4rw,Uid:d20cdc94-0c4e-46d9-aba5-b95a8c8f72f7,Namespace:calico-system,Attempt:0,} returns sandbox id \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\"" Mar 17 18:50:17.919175 env[1393]: time="2025-03-17T18:50:17.919143556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:50:17.943249 env[1393]: time="2025-03-17T18:50:17.943203904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-688bd55b76-r96kj,Uid:bb1aac8e-dad7-4a95-8d5e-b3b2a3d77ed5,Namespace:calico-system,Attempt:0,} returns sandbox id \"9151bd593ea02788a7e3a06dd76c1801cb8cd0b4891b23137107cabac69e89e9\"" Mar 17 18:50:18.305000 audit[2969]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:18.305000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc27e2c160 a2=0 a3=7ffc27e2c14c items=0 ppid=2630 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:18.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:18.311000 audit[2969]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:18.311000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc27e2c160 a2=0 a3=0 items=0 ppid=2630 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:18.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:19.303870 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1255672507.mount: Deactivated successfully. Mar 17 18:50:19.388131 kubelet[2493]: E0317 18:50:19.388081 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:19.484176 env[1393]: time="2025-03-17T18:50:19.484132565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:19.491457 env[1393]: time="2025-03-17T18:50:19.491364507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:19.496418 env[1393]: time="2025-03-17T18:50:19.496385537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:19.499919 env[1393]: time="2025-03-17T18:50:19.499890358Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:19.500367 env[1393]: time="2025-03-17T18:50:19.500325561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 18:50:19.502183 env[1393]: time="2025-03-17T18:50:19.502158571Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 18:50:19.503340 env[1393]: time="2025-03-17T18:50:19.503309978Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:50:19.533676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3692399525.mount: Deactivated successfully. Mar 17 18:50:19.554984 env[1393]: time="2025-03-17T18:50:19.554526482Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8\"" Mar 17 18:50:19.556320 env[1393]: time="2025-03-17T18:50:19.555363787Z" level=info msg="StartContainer for \"9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8\"" Mar 17 18:50:19.574255 systemd[1]: Started cri-containerd-9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8.scope. Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f51680ab958 items=0 ppid=2927 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:19.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353761303866643661666365633436336462653635616463323437 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.595000 audit: BPF prog-id=124 op=LOAD Mar 17 18:50:19.595000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002829f8 items=0 ppid=2927 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:19.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353761303866643661666365633436336462653635616463323437 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit: BPF prog-id=125 op=LOAD Mar 17 18:50:19.596000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000282a48 items=0 ppid=2927 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:19.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353761303866643661666365633436336462653635616463323437 Mar 17 18:50:19.596000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:50:19.596000 audit: BPF prog-id=124 op=UNLOAD Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:19.596000 audit: BPF prog-id=126 op=LOAD Mar 17 18:50:19.596000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000282ad8 items=0 ppid=2927 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:19.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353761303866643661666365633436336462653635616463323437 Mar 17 18:50:19.615063 env[1393]: time="2025-03-17T18:50:19.614989240Z" level=info msg="StartContainer for \"9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8\" returns successfully" Mar 17 18:50:19.624025 systemd[1]: cri-containerd-9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8.scope: Deactivated successfully. Mar 17 18:50:19.629000 audit: BPF prog-id=126 op=UNLOAD Mar 17 18:50:19.648476 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8-rootfs.mount: Deactivated successfully. Mar 17 18:50:20.385088 env[1393]: time="2025-03-17T18:50:20.385035463Z" level=info msg="shim disconnected" id=9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8 Mar 17 18:50:20.385664 env[1393]: time="2025-03-17T18:50:20.385636366Z" level=warning msg="cleaning up after shim disconnected" id=9157a08fd6afcec463dbe65adc2478c338b7fe1c7f163f7089088ae1f68b0ff8 namespace=k8s.io Mar 17 18:50:20.385807 env[1393]: time="2025-03-17T18:50:20.385790667Z" level=info msg="cleaning up dead shim" Mar 17 18:50:20.401656 env[1393]: time="2025-03-17T18:50:20.401618159Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:50:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3021 runtime=io.containerd.runc.v2\n" Mar 17 18:50:21.388568 kubelet[2493]: E0317 18:50:21.388509 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:22.327015 env[1393]: time="2025-03-17T18:50:22.326962188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:22.332841 env[1393]: time="2025-03-17T18:50:22.332801221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:22.337357 env[1393]: time="2025-03-17T18:50:22.337321546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:22.340751 env[1393]: time="2025-03-17T18:50:22.340711265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:22.341400 env[1393]: time="2025-03-17T18:50:22.341369969Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Mar 17 18:50:22.345397 env[1393]: time="2025-03-17T18:50:22.345357891Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:50:22.360950 env[1393]: time="2025-03-17T18:50:22.360917978Z" level=info msg="CreateContainer within sandbox \"9151bd593ea02788a7e3a06dd76c1801cb8cd0b4891b23137107cabac69e89e9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 18:50:22.400945 env[1393]: time="2025-03-17T18:50:22.400891303Z" level=info msg="CreateContainer within sandbox \"9151bd593ea02788a7e3a06dd76c1801cb8cd0b4891b23137107cabac69e89e9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"9446c8359d50499f3593a9fcfad4e448abac567eadfd788cd54608dbd14cdaf8\"" Mar 17 18:50:22.402806 env[1393]: time="2025-03-17T18:50:22.401522106Z" level=info msg="StartContainer for \"9446c8359d50499f3593a9fcfad4e448abac567eadfd788cd54608dbd14cdaf8\"" Mar 17 18:50:22.426002 systemd[1]: Started cri-containerd-9446c8359d50499f3593a9fcfad4e448abac567eadfd788cd54608dbd14cdaf8.scope. Mar 17 18:50:22.456934 kernel: kauditd_printk_skb: 166 callbacks suppressed Mar 17 18:50:22.457122 kernel: audit: type=1400 audit(1742237422.439:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.471146 kernel: audit: type=1400 audit(1742237422.439:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.483725 kernel: audit: type=1400 audit(1742237422.439:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.498025 kernel: audit: type=1400 audit(1742237422.439:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.524973 kernel: audit: type=1400 audit(1742237422.439:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.525074 kernel: audit: type=1400 audit(1742237422.439:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.537803 kernel: audit: type=1400 audit(1742237422.439:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.552036 kernel: audit: type=1400 audit(1742237422.439:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.565014 kernel: audit: type=1400 audit(1742237422.439:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.580524 kernel: audit: type=1400 audit(1742237422.470:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.470000 audit: BPF prog-id=127 op=LOAD Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2863 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:22.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343663383335396435303439396633353933613966636661643465 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2863 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:22.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343663383335396435303439396633353933613966636661643465 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.485000 audit: BPF prog-id=128 op=LOAD Mar 17 18:50:22.485000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002892a0 items=0 ppid=2863 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:22.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343663383335396435303439396633353933613966636661643465 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit: BPF prog-id=129 op=LOAD Mar 17 18:50:22.496000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002892e8 items=0 ppid=2863 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:22.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343663383335396435303439396633353933613966636661643465 Mar 17 18:50:22.496000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:50:22.496000 audit: BPF prog-id=128 op=UNLOAD Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:22.496000 audit: BPF prog-id=130 op=LOAD Mar 17 18:50:22.496000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002896f8 items=0 ppid=2863 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:22.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934343663383335396435303439396633353933613966636661643465 Mar 17 18:50:22.588295 env[1393]: time="2025-03-17T18:50:22.588256854Z" level=info msg="StartContainer for \"9446c8359d50499f3593a9fcfad4e448abac567eadfd788cd54608dbd14cdaf8\" returns successfully" Mar 17 18:50:23.388799 kubelet[2493]: E0317 18:50:23.388746 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:23.515346 kubelet[2493]: I0317 18:50:23.515300 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-688bd55b76-r96kj" podStartSLOduration=2.116798937 podStartE2EDuration="6.515283603s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:17.944524612 +0000 UTC m=+21.677893624" lastFinishedPulling="2025-03-17 18:50:22.343009278 +0000 UTC m=+26.076378290" observedRunningTime="2025-03-17 18:50:23.503109936 +0000 UTC m=+27.236479048" watchObservedRunningTime="2025-03-17 18:50:23.515283603 +0000 UTC m=+27.248652715" Mar 17 18:50:23.531000 audit[3076]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:23.531000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe867bacc0 a2=0 a3=7ffe867bacac items=0 ppid=2630 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:23.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:23.536000 audit[3076]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:23.536000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe867bacc0 a2=0 a3=7ffe867bacac items=0 ppid=2630 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:23.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:25.389104 kubelet[2493]: E0317 18:50:25.389056 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:26.969530 env[1393]: time="2025-03-17T18:50:26.969473380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:26.977676 env[1393]: time="2025-03-17T18:50:26.977631523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:26.982372 env[1393]: time="2025-03-17T18:50:26.982336448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:26.988815 env[1393]: time="2025-03-17T18:50:26.988782981Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:26.989262 env[1393]: time="2025-03-17T18:50:26.989229884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 18:50:26.992827 env[1393]: time="2025-03-17T18:50:26.992795402Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:50:27.026032 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2940796201.mount: Deactivated successfully. Mar 17 18:50:27.044224 env[1393]: time="2025-03-17T18:50:27.044176867Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c\"" Mar 17 18:50:27.045929 env[1393]: time="2025-03-17T18:50:27.044775770Z" level=info msg="StartContainer for \"72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c\"" Mar 17 18:50:27.079774 systemd[1]: Started cri-containerd-72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c.scope. Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff0531db8e8 items=0 ppid=2927 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:27.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732613532613135303730326338356433333730626461306666386635 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.096000 audit: BPF prog-id=131 op=LOAD Mar 17 18:50:27.096000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00032dbc8 items=0 ppid=2927 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:27.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732613532613135303730326338356433333730626461306666386635 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit: BPF prog-id=132 op=LOAD Mar 17 18:50:27.097000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00032dc18 items=0 ppid=2927 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732613532613135303730326338356433333730626461306666386635 Mar 17 18:50:27.097000 audit: BPF prog-id=132 op=UNLOAD Mar 17 18:50:27.097000 audit: BPF prog-id=131 op=UNLOAD Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { perfmon } for pid=3084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit[3084]: AVC avc: denied { bpf } for pid=3084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:27.097000 audit: BPF prog-id=133 op=LOAD Mar 17 18:50:27.097000 audit[3084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00032dca8 items=0 ppid=2927 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:27.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732613532613135303730326338356433333730626461306666386635 Mar 17 18:50:27.127158 env[1393]: time="2025-03-17T18:50:27.127111694Z" level=info msg="StartContainer for \"72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c\" returns successfully" Mar 17 18:50:27.389046 kubelet[2493]: E0317 18:50:27.388971 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:28.022540 systemd[1]: run-containerd-runc-k8s.io-72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c-runc.i8kmFg.mount: Deactivated successfully. Mar 17 18:50:28.493587 env[1393]: time="2025-03-17T18:50:28.493442179Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:50:28.495961 systemd[1]: cri-containerd-72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c.scope: Deactivated successfully. Mar 17 18:50:28.506018 kernel: kauditd_printk_skb: 96 callbacks suppressed Mar 17 18:50:28.506105 kernel: audit: type=1334 audit(1742237428.499:949): prog-id=133 op=UNLOAD Mar 17 18:50:28.499000 audit: BPF prog-id=133 op=UNLOAD Mar 17 18:50:28.523528 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c-rootfs.mount: Deactivated successfully. Mar 17 18:50:28.578432 kubelet[2493]: I0317 18:50:28.578384 2493 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Mar 17 18:50:29.028947 waagent[1591]: 2025-03-17T18:50:28.581638Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 2] Mar 17 18:50:28.615895 systemd[1]: Created slice kubepods-burstable-pode1039987_282f_4b16_82a7_62cee169ff89.slice. Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.607675 2493 topology_manager.go:215] "Topology Admit Handler" podUID="e1039987-282f-4b16-82a7-62cee169ff89" podNamespace="kube-system" podName="coredns-7db6d8ff4d-wvc6w" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.615139 2493 topology_manager.go:215] "Topology Admit Handler" podUID="8d640bba-0229-4c6f-83a6-c6475a264dc8" podNamespace="kube-system" podName="coredns-7db6d8ff4d-fkltq" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.640786 2493 topology_manager.go:215] "Topology Admit Handler" podUID="8aa558d3-f357-4b87-9397-bc72517eb6b8" podNamespace="calico-system" podName="calico-kube-controllers-57b4c557cd-z582z" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.641129 2493 topology_manager.go:215] "Topology Admit Handler" podUID="247e8772-f8ae-45ef-b4a2-6a845e9d9c87" podNamespace="calico-apiserver" podName="calico-apiserver-6765df6b74-2rg6f" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.645959 2493 topology_manager.go:215] "Topology Admit Handler" podUID="f024ce9b-71cd-4457-9d10-6cdc40d182d1" podNamespace="calico-apiserver" podName="calico-apiserver-6765df6b74-bp7cw" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.705631 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ddsd7\" (UniqueName: \"kubernetes.io/projected/8d640bba-0229-4c6f-83a6-c6475a264dc8-kube-api-access-ddsd7\") pod \"coredns-7db6d8ff4d-fkltq\" (UID: \"8d640bba-0229-4c6f-83a6-c6475a264dc8\") " pod="kube-system/coredns-7db6d8ff4d-fkltq" Mar 17 18:50:29.029607 kubelet[2493]: I0317 18:50:28.705668 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e1039987-282f-4b16-82a7-62cee169ff89-config-volume\") pod \"coredns-7db6d8ff4d-wvc6w\" (UID: \"e1039987-282f-4b16-82a7-62cee169ff89\") " pod="kube-system/coredns-7db6d8ff4d-wvc6w" Mar 17 18:50:28.643204 systemd[1]: Created slice kubepods-burstable-pod8d640bba_0229_4c6f_83a6_c6475a264dc8.slice. Mar 17 18:50:29.030164 kubelet[2493]: I0317 18:50:28.705689 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wpxq7\" (UniqueName: \"kubernetes.io/projected/e1039987-282f-4b16-82a7-62cee169ff89-kube-api-access-wpxq7\") pod \"coredns-7db6d8ff4d-wvc6w\" (UID: \"e1039987-282f-4b16-82a7-62cee169ff89\") " pod="kube-system/coredns-7db6d8ff4d-wvc6w" Mar 17 18:50:29.030164 kubelet[2493]: I0317 18:50:28.705710 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8d640bba-0229-4c6f-83a6-c6475a264dc8-config-volume\") pod \"coredns-7db6d8ff4d-fkltq\" (UID: \"8d640bba-0229-4c6f-83a6-c6475a264dc8\") " pod="kube-system/coredns-7db6d8ff4d-fkltq" Mar 17 18:50:29.030164 kubelet[2493]: I0317 18:50:28.806787 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gdwcv\" (UniqueName: \"kubernetes.io/projected/247e8772-f8ae-45ef-b4a2-6a845e9d9c87-kube-api-access-gdwcv\") pod \"calico-apiserver-6765df6b74-2rg6f\" (UID: \"247e8772-f8ae-45ef-b4a2-6a845e9d9c87\") " pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" Mar 17 18:50:29.030164 kubelet[2493]: I0317 18:50:28.806842 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/247e8772-f8ae-45ef-b4a2-6a845e9d9c87-calico-apiserver-certs\") pod \"calico-apiserver-6765df6b74-2rg6f\" (UID: \"247e8772-f8ae-45ef-b4a2-6a845e9d9c87\") " pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" Mar 17 18:50:29.030164 kubelet[2493]: I0317 18:50:28.806890 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-swr9t\" (UniqueName: \"kubernetes.io/projected/f024ce9b-71cd-4457-9d10-6cdc40d182d1-kube-api-access-swr9t\") pod \"calico-apiserver-6765df6b74-bp7cw\" (UID: \"f024ce9b-71cd-4457-9d10-6cdc40d182d1\") " pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" Mar 17 18:50:28.653873 systemd[1]: Created slice kubepods-besteffort-pod247e8772_f8ae_45ef_b4a2_6a845e9d9c87.slice. Mar 17 18:50:29.030607 kubelet[2493]: I0317 18:50:28.806970 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f024ce9b-71cd-4457-9d10-6cdc40d182d1-calico-apiserver-certs\") pod \"calico-apiserver-6765df6b74-bp7cw\" (UID: \"f024ce9b-71cd-4457-9d10-6cdc40d182d1\") " pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" Mar 17 18:50:29.030607 kubelet[2493]: I0317 18:50:28.807077 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8aa558d3-f357-4b87-9397-bc72517eb6b8-tigera-ca-bundle\") pod \"calico-kube-controllers-57b4c557cd-z582z\" (UID: \"8aa558d3-f357-4b87-9397-bc72517eb6b8\") " pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" Mar 17 18:50:29.030607 kubelet[2493]: I0317 18:50:28.807140 2493 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n74nh\" (UniqueName: \"kubernetes.io/projected/8aa558d3-f357-4b87-9397-bc72517eb6b8-kube-api-access-n74nh\") pod \"calico-kube-controllers-57b4c557cd-z582z\" (UID: \"8aa558d3-f357-4b87-9397-bc72517eb6b8\") " pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" Mar 17 18:50:28.657903 systemd[1]: Created slice kubepods-besteffort-pod8aa558d3_f357_4b87_9397_bc72517eb6b8.slice. Mar 17 18:50:28.667595 systemd[1]: Created slice kubepods-besteffort-podf024ce9b_71cd_4457_9d10_6cdc40d182d1.slice. Mar 17 18:50:29.040114 waagent[1591]: 2025-03-17T18:50:29.037965Z INFO ExtHandler Mar 17 18:50:29.040359 waagent[1591]: 2025-03-17T18:50:29.040286Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: d30de7f2-eb7a-4b54-94c4-2d820b9c1ebd eTag: 12679237884716421946 source: Fabric] Mar 17 18:50:29.050509 waagent[1591]: 2025-03-17T18:50:29.041253Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 18:50:29.050509 waagent[1591]: 2025-03-17T18:50:29.048417Z INFO ExtHandler Mar 17 18:50:29.050509 waagent[1591]: 2025-03-17T18:50:29.048570Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 2] Mar 17 18:50:29.135927 waagent[1591]: 2025-03-17T18:50:29.135860Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 18:50:29.334277 env[1393]: time="2025-03-17T18:50:29.333656702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wvc6w,Uid:e1039987-282f-4b16-82a7-62cee169ff89,Namespace:kube-system,Attempt:0,}" Mar 17 18:50:29.336441 env[1393]: time="2025-03-17T18:50:29.336393815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b4c557cd-z582z,Uid:8aa558d3-f357-4b87-9397-bc72517eb6b8,Namespace:calico-system,Attempt:0,}" Mar 17 18:50:29.336815 env[1393]: time="2025-03-17T18:50:29.336764817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-2rg6f,Uid:247e8772-f8ae-45ef-b4a2-6a845e9d9c87,Namespace:calico-apiserver,Attempt:0,}" Mar 17 18:50:29.337079 env[1393]: time="2025-03-17T18:50:29.337047619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fkltq,Uid:8d640bba-0229-4c6f-83a6-c6475a264dc8,Namespace:kube-system,Attempt:0,}" Mar 17 18:50:29.337237 env[1393]: time="2025-03-17T18:50:29.337048119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-bp7cw,Uid:f024ce9b-71cd-4457-9d10-6cdc40d182d1,Namespace:calico-apiserver,Attempt:0,}" Mar 17 18:50:29.394182 systemd[1]: Created slice kubepods-besteffort-pode7d868b1_5177_4620_8f50_dbb00237cb1d.slice. Mar 17 18:50:29.397181 env[1393]: time="2025-03-17T18:50:29.397136118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dnzzl,Uid:e7d868b1-5177-4620-8f50-dbb00237cb1d,Namespace:calico-system,Attempt:0,}" Mar 17 18:50:29.982821 waagent[1591]: 2025-03-17T18:50:29.982689Z INFO ExtHandler Downloaded certificate {'thumbprint': '3ED3A9ADDB67897121DBE1EDAB588B64F9ADBFDB', 'hasPrivateKey': False} Mar 17 18:50:29.983934 waagent[1591]: 2025-03-17T18:50:29.983860Z INFO ExtHandler Downloaded certificate {'thumbprint': '1BC748347FC8A1C5DC053E23747F0F913E306A89', 'hasPrivateKey': True} Mar 17 18:50:29.984976 waagent[1591]: 2025-03-17T18:50:29.984911Z INFO ExtHandler Fetch goal state completed Mar 17 18:50:29.985947 waagent[1591]: 2025-03-17T18:50:29.985883Z INFO ExtHandler ExtHandler VM enabled for RSM updates, switching to RSM update mode Mar 17 18:50:29.987178 waagent[1591]: 2025-03-17T18:50:29.987115Z INFO ExtHandler ExtHandler Mar 17 18:50:29.987337 waagent[1591]: 2025-03-17T18:50:29.987276Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_2 channel: WireServer source: Fabric activity: 01b03454-bef1-4c81-ad3c-697e834cd074 correlation 53bac984-858d-4c41-8359-6170d71560c3 created: 2025-03-17T18:50:19.058456Z] Mar 17 18:50:29.988094 waagent[1591]: 2025-03-17T18:50:29.988037Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 18:50:29.989878 waagent[1591]: 2025-03-17T18:50:29.989821Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_2 2 ms] Mar 17 18:50:30.740625 env[1393]: time="2025-03-17T18:50:30.740574544Z" level=info msg="shim disconnected" id=72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c Mar 17 18:50:30.740625 env[1393]: time="2025-03-17T18:50:30.740620444Z" level=warning msg="cleaning up after shim disconnected" id=72a52a150702c85d3370bda0ff8f598c0efa77c1830c21de1d7a1bce28fb521c namespace=k8s.io Mar 17 18:50:30.740625 env[1393]: time="2025-03-17T18:50:30.740631244Z" level=info msg="cleaning up dead shim" Mar 17 18:50:30.748872 env[1393]: time="2025-03-17T18:50:30.748829084Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:50:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3155 runtime=io.containerd.runc.v2\n" Mar 17 18:50:31.100240 env[1393]: time="2025-03-17T18:50:31.100155097Z" level=error msg="Failed to destroy network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.100655 env[1393]: time="2025-03-17T18:50:31.100603899Z" level=error msg="encountered an error cleaning up failed sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.100768 env[1393]: time="2025-03-17T18:50:31.100685799Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b4c557cd-z582z,Uid:8aa558d3-f357-4b87-9397-bc72517eb6b8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.101033 kubelet[2493]: E0317 18:50:31.100964 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.101387 kubelet[2493]: E0317 18:50:31.101084 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" Mar 17 18:50:31.101387 kubelet[2493]: E0317 18:50:31.101113 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" Mar 17 18:50:31.101387 kubelet[2493]: E0317 18:50:31.101206 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-57b4c557cd-z582z_calico-system(8aa558d3-f357-4b87-9397-bc72517eb6b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-57b4c557cd-z582z_calico-system(8aa558d3-f357-4b87-9397-bc72517eb6b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" podUID="8aa558d3-f357-4b87-9397-bc72517eb6b8" Mar 17 18:50:31.106481 env[1393]: time="2025-03-17T18:50:31.106434127Z" level=error msg="Failed to destroy network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.107079 env[1393]: time="2025-03-17T18:50:31.107035330Z" level=error msg="encountered an error cleaning up failed sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.107247 env[1393]: time="2025-03-17T18:50:31.107216231Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-bp7cw,Uid:f024ce9b-71cd-4457-9d10-6cdc40d182d1,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.107759 kubelet[2493]: E0317 18:50:31.107524 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.107759 kubelet[2493]: E0317 18:50:31.107580 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" Mar 17 18:50:31.107759 kubelet[2493]: E0317 18:50:31.107638 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" Mar 17 18:50:31.107989 kubelet[2493]: E0317 18:50:31.107691 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6765df6b74-bp7cw_calico-apiserver(f024ce9b-71cd-4457-9d10-6cdc40d182d1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6765df6b74-bp7cw_calico-apiserver(f024ce9b-71cd-4457-9d10-6cdc40d182d1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" podUID="f024ce9b-71cd-4457-9d10-6cdc40d182d1" Mar 17 18:50:31.158864 env[1393]: time="2025-03-17T18:50:31.158793779Z" level=error msg="Failed to destroy network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.159602 env[1393]: time="2025-03-17T18:50:31.159553783Z" level=error msg="encountered an error cleaning up failed sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.159807 env[1393]: time="2025-03-17T18:50:31.159763184Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wvc6w,Uid:e1039987-282f-4b16-82a7-62cee169ff89,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.160219 kubelet[2493]: E0317 18:50:31.160164 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.160336 kubelet[2493]: E0317 18:50:31.160244 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-wvc6w" Mar 17 18:50:31.160336 kubelet[2493]: E0317 18:50:31.160284 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-wvc6w" Mar 17 18:50:31.160431 kubelet[2493]: E0317 18:50:31.160350 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-wvc6w_kube-system(e1039987-282f-4b16-82a7-62cee169ff89)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-wvc6w_kube-system(e1039987-282f-4b16-82a7-62cee169ff89)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wvc6w" podUID="e1039987-282f-4b16-82a7-62cee169ff89" Mar 17 18:50:31.181524 env[1393]: time="2025-03-17T18:50:31.181464988Z" level=error msg="Failed to destroy network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.182107 env[1393]: time="2025-03-17T18:50:31.182063191Z" level=error msg="encountered an error cleaning up failed sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.182310 env[1393]: time="2025-03-17T18:50:31.182269592Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-2rg6f,Uid:247e8772-f8ae-45ef-b4a2-6a845e9d9c87,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.182682 kubelet[2493]: E0317 18:50:31.182636 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.182786 kubelet[2493]: E0317 18:50:31.182713 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" Mar 17 18:50:31.182786 kubelet[2493]: E0317 18:50:31.182744 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" Mar 17 18:50:31.183016 kubelet[2493]: E0317 18:50:31.182806 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6765df6b74-2rg6f_calico-apiserver(247e8772-f8ae-45ef-b4a2-6a845e9d9c87)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6765df6b74-2rg6f_calico-apiserver(247e8772-f8ae-45ef-b4a2-6a845e9d9c87)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" podUID="247e8772-f8ae-45ef-b4a2-6a845e9d9c87" Mar 17 18:50:31.186248 env[1393]: time="2025-03-17T18:50:31.184085101Z" level=error msg="Failed to destroy network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.186248 env[1393]: time="2025-03-17T18:50:31.184412703Z" level=error msg="encountered an error cleaning up failed sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.186248 env[1393]: time="2025-03-17T18:50:31.184483703Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fkltq,Uid:8d640bba-0229-4c6f-83a6-c6475a264dc8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.186430 kubelet[2493]: E0317 18:50:31.184691 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.186430 kubelet[2493]: E0317 18:50:31.184736 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fkltq" Mar 17 18:50:31.186430 kubelet[2493]: E0317 18:50:31.184772 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fkltq" Mar 17 18:50:31.186570 kubelet[2493]: E0317 18:50:31.184814 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-fkltq_kube-system(8d640bba-0229-4c6f-83a6-c6475a264dc8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-fkltq_kube-system(8d640bba-0229-4c6f-83a6-c6475a264dc8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fkltq" podUID="8d640bba-0229-4c6f-83a6-c6475a264dc8" Mar 17 18:50:31.195592 env[1393]: time="2025-03-17T18:50:31.195552656Z" level=error msg="Failed to destroy network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.196091 env[1393]: time="2025-03-17T18:50:31.196050559Z" level=error msg="encountered an error cleaning up failed sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.196287 env[1393]: time="2025-03-17T18:50:31.196232760Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dnzzl,Uid:e7d868b1-5177-4620-8f50-dbb00237cb1d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.196559 kubelet[2493]: E0317 18:50:31.196528 2493 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.196656 kubelet[2493]: E0317 18:50:31.196578 2493 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:31.196656 kubelet[2493]: E0317 18:50:31.196606 2493 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dnzzl" Mar 17 18:50:31.196755 kubelet[2493]: E0317 18:50:31.196646 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dnzzl_calico-system(e7d868b1-5177-4620-8f50-dbb00237cb1d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dnzzl_calico-system(e7d868b1-5177-4620-8f50-dbb00237cb1d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:31.518450 kubelet[2493]: I0317 18:50:31.518415 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:31.519417 env[1393]: time="2025-03-17T18:50:31.519380117Z" level=info msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" Mar 17 18:50:31.519864 kubelet[2493]: I0317 18:50:31.519839 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:31.520419 env[1393]: time="2025-03-17T18:50:31.520385822Z" level=info msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" Mar 17 18:50:31.521973 kubelet[2493]: I0317 18:50:31.521953 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:31.523576 env[1393]: time="2025-03-17T18:50:31.522448332Z" level=info msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" Mar 17 18:50:31.523671 kubelet[2493]: I0317 18:50:31.523603 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:31.524167 env[1393]: time="2025-03-17T18:50:31.524136840Z" level=info msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" Mar 17 18:50:31.530485 env[1393]: time="2025-03-17T18:50:31.530457570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:50:31.540032 kubelet[2493]: I0317 18:50:31.535836 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:31.540032 kubelet[2493]: I0317 18:50:31.537668 2493 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:31.540198 env[1393]: time="2025-03-17T18:50:31.536383899Z" level=info msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" Mar 17 18:50:31.540198 env[1393]: time="2025-03-17T18:50:31.538214308Z" level=info msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" Mar 17 18:50:31.677414 env[1393]: time="2025-03-17T18:50:31.677341478Z" level=error msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" failed" error="failed to destroy network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.677642 kubelet[2493]: E0317 18:50:31.677601 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:31.677723 kubelet[2493]: E0317 18:50:31.677661 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409"} Mar 17 18:50:31.677780 kubelet[2493]: E0317 18:50:31.677732 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8d640bba-0229-4c6f-83a6-c6475a264dc8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.677780 kubelet[2493]: E0317 18:50:31.677765 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8d640bba-0229-4c6f-83a6-c6475a264dc8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fkltq" podUID="8d640bba-0229-4c6f-83a6-c6475a264dc8" Mar 17 18:50:31.678767 env[1393]: time="2025-03-17T18:50:31.678713185Z" level=error msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" failed" error="failed to destroy network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.678944 kubelet[2493]: E0317 18:50:31.678901 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:31.679047 kubelet[2493]: E0317 18:50:31.678959 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5"} Mar 17 18:50:31.679047 kubelet[2493]: E0317 18:50:31.679017 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8aa558d3-f357-4b87-9397-bc72517eb6b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.679194 kubelet[2493]: E0317 18:50:31.679046 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8aa558d3-f357-4b87-9397-bc72517eb6b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" podUID="8aa558d3-f357-4b87-9397-bc72517eb6b8" Mar 17 18:50:31.680510 env[1393]: time="2025-03-17T18:50:31.680465493Z" level=error msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" failed" error="failed to destroy network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.680667 kubelet[2493]: E0317 18:50:31.680621 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:31.680750 kubelet[2493]: E0317 18:50:31.680679 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd"} Mar 17 18:50:31.680750 kubelet[2493]: E0317 18:50:31.680713 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f024ce9b-71cd-4457-9d10-6cdc40d182d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.680750 kubelet[2493]: E0317 18:50:31.680738 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f024ce9b-71cd-4457-9d10-6cdc40d182d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" podUID="f024ce9b-71cd-4457-9d10-6cdc40d182d1" Mar 17 18:50:31.686162 env[1393]: time="2025-03-17T18:50:31.686119621Z" level=error msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" failed" error="failed to destroy network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.686570 kubelet[2493]: E0317 18:50:31.686412 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:31.686570 kubelet[2493]: E0317 18:50:31.686458 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360"} Mar 17 18:50:31.686570 kubelet[2493]: E0317 18:50:31.686491 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1039987-282f-4b16-82a7-62cee169ff89\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.686570 kubelet[2493]: E0317 18:50:31.686529 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1039987-282f-4b16-82a7-62cee169ff89\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-wvc6w" podUID="e1039987-282f-4b16-82a7-62cee169ff89" Mar 17 18:50:31.688690 env[1393]: time="2025-03-17T18:50:31.688649133Z" level=error msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" failed" error="failed to destroy network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.688852 kubelet[2493]: E0317 18:50:31.688808 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:31.688933 kubelet[2493]: E0317 18:50:31.688852 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243"} Mar 17 18:50:31.688933 kubelet[2493]: E0317 18:50:31.688881 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"247e8772-f8ae-45ef-b4a2-6a845e9d9c87\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.689069 kubelet[2493]: E0317 18:50:31.688923 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"247e8772-f8ae-45ef-b4a2-6a845e9d9c87\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" podUID="247e8772-f8ae-45ef-b4a2-6a845e9d9c87" Mar 17 18:50:31.690798 env[1393]: time="2025-03-17T18:50:31.690761643Z" level=error msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" failed" error="failed to destroy network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:50:31.690949 kubelet[2493]: E0317 18:50:31.690918 2493 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:31.691060 kubelet[2493]: E0317 18:50:31.690959 2493 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c"} Mar 17 18:50:31.691060 kubelet[2493]: E0317 18:50:31.691006 2493 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e7d868b1-5177-4620-8f50-dbb00237cb1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:50:31.691060 kubelet[2493]: E0317 18:50:31.691041 2493 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e7d868b1-5177-4620-8f50-dbb00237cb1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dnzzl" podUID="e7d868b1-5177-4620-8f50-dbb00237cb1d" Mar 17 18:50:31.862360 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360-shm.mount: Deactivated successfully. Mar 17 18:50:31.862480 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd-shm.mount: Deactivated successfully. Mar 17 18:50:31.862553 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5-shm.mount: Deactivated successfully. Mar 17 18:50:38.240949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3266535416.mount: Deactivated successfully. Mar 17 18:50:38.282937 env[1393]: time="2025-03-17T18:50:38.282892988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:38.294896 env[1393]: time="2025-03-17T18:50:38.294851340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:38.300614 env[1393]: time="2025-03-17T18:50:38.300580765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:38.304752 env[1393]: time="2025-03-17T18:50:38.304719083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:38.305208 env[1393]: time="2025-03-17T18:50:38.305178085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 18:50:38.323814 env[1393]: time="2025-03-17T18:50:38.323780166Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:50:38.371018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3067142619.mount: Deactivated successfully. Mar 17 18:50:38.387498 env[1393]: time="2025-03-17T18:50:38.387456043Z" level=info msg="CreateContainer within sandbox \"6d87fbf577438c5421e3cbb7a3c11072de34aaec30c0f72839facd44bb504bf6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5\"" Mar 17 18:50:38.389620 env[1393]: time="2025-03-17T18:50:38.389582752Z" level=info msg="StartContainer for \"511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5\"" Mar 17 18:50:38.407554 systemd[1]: Started cri-containerd-511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5.scope. Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcb8e223c28 items=0 ppid=2927 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:38.458821 kernel: audit: type=1400 audit(1742237438.425:950): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.458944 kernel: audit: type=1300 audit(1742237438.425:950): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fcb8e223c28 items=0 ppid=2927 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:38.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316338343036626562343265316262333236633663666433353732 Mar 17 18:50:38.477144 kernel: audit: type=1327 audit(1742237438.425:950): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316338343036626562343265316262333236633663666433353732 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.490560 env[1393]: time="2025-03-17T18:50:38.490513690Z" level=info msg="StartContainer for \"511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5\" returns successfully" Mar 17 18:50:38.491387 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.516477 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.516556 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.516586 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.541888 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.556014 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.556084 kernel: audit: type=1400 audit(1742237438.425:951): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit: BPF prog-id=134 op=LOAD Mar 17 18:50:38.425000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001be6b8 items=0 ppid=2927 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:38.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316338343036626562343265316262333236633663666433353732 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit: BPF prog-id=135 op=LOAD Mar 17 18:50:38.425000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001be708 items=0 ppid=2927 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:38.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316338343036626562343265316262333236633663666433353732 Mar 17 18:50:38.425000 audit: BPF prog-id=135 op=UNLOAD Mar 17 18:50:38.425000 audit: BPF prog-id=134 op=UNLOAD Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:38.425000 audit: BPF prog-id=136 op=LOAD Mar 17 18:50:38.425000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001be798 items=0 ppid=2927 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:38.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316338343036626562343265316262333236633663666433353732 Mar 17 18:50:38.593721 kubelet[2493]: I0317 18:50:38.593656 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vf4rw" podStartSLOduration=1.2060726019999999 podStartE2EDuration="21.593632438s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:17.918601153 +0000 UTC m=+21.651970265" lastFinishedPulling="2025-03-17 18:50:38.306161089 +0000 UTC m=+42.039530101" observedRunningTime="2025-03-17 18:50:38.592645634 +0000 UTC m=+42.326014746" watchObservedRunningTime="2025-03-17 18:50:38.593632438 +0000 UTC m=+42.327001550" Mar 17 18:50:38.757063 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:50:38.757215 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:50:40.100000 audit[3638]: AVC avc: denied { write } for pid=3638 comm="tee" name="fd" dev="proc" ino=30870 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.104000 audit[3651]: AVC avc: denied { write } for pid=3651 comm="tee" name="fd" dev="proc" ino=29977 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.104000 audit[3651]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe59909a11 a2=241 a3=1b6 items=1 ppid=3615 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.104000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:50:40.104000 audit: PATH item=0 name="/dev/fd/63" inode=29974 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.100000 audit[3638]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9b9ffa10 a2=241 a3=1b6 items=1 ppid=3601 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.100000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:50:40.100000 audit: PATH item=0 name="/dev/fd/63" inode=30857 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.134000 audit[3654]: AVC avc: denied { write } for pid=3654 comm="tee" name="fd" dev="proc" ino=29989 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.134000 audit[3654]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdba660a10 a2=241 a3=1b6 items=1 ppid=3608 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.134000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:50:40.134000 audit: PATH item=0 name="/dev/fd/63" inode=30875 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.146000 audit[3659]: AVC avc: denied { write } for pid=3659 comm="tee" name="fd" dev="proc" ino=29993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.146000 audit[3659]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0bbc9a10 a2=241 a3=1b6 items=1 ppid=3599 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.146000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:50:40.146000 audit: PATH item=0 name="/dev/fd/63" inode=30884 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.149000 audit[3657]: AVC avc: denied { write } for pid=3657 comm="tee" name="fd" dev="proc" ino=29997 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.149000 audit[3657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9cefea01 a2=241 a3=1b6 items=1 ppid=3611 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.149000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:50:40.149000 audit: PATH item=0 name="/dev/fd/63" inode=30882 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.153000 audit[3669]: AVC avc: denied { write } for pid=3669 comm="tee" name="fd" dev="proc" ino=30891 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.164000 audit[3671]: AVC avc: denied { write } for pid=3671 comm="tee" name="fd" dev="proc" ino=30001 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:50:40.164000 audit[3671]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4a043a00 a2=241 a3=1b6 items=1 ppid=3604 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.164000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:50:40.164000 audit: PATH item=0 name="/dev/fd/63" inode=30886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.153000 audit[3669]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc17effa12 a2=241 a3=1b6 items=1 ppid=3603 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.153000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:50:40.153000 audit: PATH item=0 name="/dev/fd/63" inode=30885 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:50:40.153000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit: BPF prog-id=137 op=LOAD Mar 17 18:50:40.342000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8643a960 a2=98 a3=3 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.342000 audit: BPF prog-id=137 op=UNLOAD Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit: BPF prog-id=138 op=LOAD Mar 17 18:50:40.342000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8643a740 a2=74 a3=540051 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.342000 audit: BPF prog-id=138 op=UNLOAD Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.342000 audit: BPF prog-id=139 op=LOAD Mar 17 18:50:40.342000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8643a770 a2=94 a3=2 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.342000 audit: BPF prog-id=139 op=UNLOAD Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.460000 audit: BPF prog-id=140 op=LOAD Mar 17 18:50:40.460000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8643a630 a2=40 a3=1 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.460000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.461000 audit: BPF prog-id=140 op=UNLOAD Mar 17 18:50:40.461000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.461000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8643a700 a2=50 a3=7ffd8643a7e0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a640 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8643a670 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8643a580 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a690 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a670 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a660 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a690 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8643a670 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8643a690 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd8643a660 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8643a6d0 a2=28 a3=0 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8643a480 a2=50 a3=1 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.471000 audit: BPF prog-id=141 op=LOAD Mar 17 18:50:40.471000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8643a480 a2=94 a3=5 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.472000 audit: BPF prog-id=141 op=UNLOAD Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8643a530 a2=50 a3=1 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd8643a650 a2=4 a3=38 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:50:40.472000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd8643a6a0 a2=94 a3=6 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:50:40.472000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd86439e50 a2=94 a3=83 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.472000 audit[3710]: AVC avc: denied { confidentiality } for pid=3710 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:50:40.472000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd86439e50 a2=94 a3=83 items=0 ppid=3609 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit: BPF prog-id=142 op=LOAD Mar 17 18:50:40.481000 audit[3713]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeacf580f0 a2=98 a3=1999999999999999 items=0 ppid=3609 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.481000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:50:40.481000 audit: BPF prog-id=142 op=UNLOAD Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit: BPF prog-id=143 op=LOAD Mar 17 18:50:40.481000 audit[3713]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeacf57fd0 a2=74 a3=ffff items=0 ppid=3609 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.481000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:50:40.481000 audit: BPF prog-id=143 op=UNLOAD Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { perfmon } for pid=3713 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit[3713]: AVC avc: denied { bpf } for pid=3713 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.481000 audit: BPF prog-id=144 op=LOAD Mar 17 18:50:40.481000 audit[3713]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeacf58010 a2=40 a3=7ffeacf581f0 items=0 ppid=3609 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.481000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:50:40.481000 audit: BPF prog-id=144 op=UNLOAD Mar 17 18:50:40.617077 systemd-networkd[1552]: vxlan.calico: Link UP Mar 17 18:50:40.617088 systemd-networkd[1552]: vxlan.calico: Gained carrier Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit: BPF prog-id=145 op=LOAD Mar 17 18:50:40.684000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee39179e0 a2=98 a3=ffffffff items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.684000 audit: BPF prog-id=145 op=UNLOAD Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit: BPF prog-id=146 op=LOAD Mar 17 18:50:40.684000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee39177f0 a2=74 a3=540051 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.684000 audit: BPF prog-id=146 op=UNLOAD Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.684000 audit: BPF prog-id=147 op=LOAD Mar 17 18:50:40.684000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee3917820 a2=94 a3=2 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.685000 audit: BPF prog-id=147 op=UNLOAD Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee39176f0 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee3917720 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee3917630 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee3917740 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee3917720 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee3917710 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee3917740 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee3917720 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee3917740 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee3917710 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee3917780 a2=28 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.686000 audit: BPF prog-id=148 op=LOAD Mar 17 18:50:40.686000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee39175f0 a2=40 a3=0 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.686000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.688000 audit: BPF prog-id=148 op=UNLOAD Mar 17 18:50:40.688000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.688000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffee39175e0 a2=50 a3=2800 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffee39175e0 a2=50 a3=2800 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.690000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit: BPF prog-id=149 op=LOAD Mar 17 18:50:40.690000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee3916e00 a2=94 a3=2 items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.690000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.690000 audit: BPF prog-id=149 op=UNLOAD Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.690000 audit: BPF prog-id=150 op=LOAD Mar 17 18:50:40.690000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee3916f00 a2=94 a3=2d items=0 ppid=3609 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.690000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.703000 audit: BPF prog-id=151 op=LOAD Mar 17 18:50:40.703000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe69a93bc0 a2=98 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.703000 audit: BPF prog-id=151 op=UNLOAD Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit: BPF prog-id=152 op=LOAD Mar 17 18:50:40.704000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe69a939a0 a2=74 a3=540051 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.704000 audit: BPF prog-id=152 op=UNLOAD Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.704000 audit: BPF prog-id=153 op=LOAD Mar 17 18:50:40.704000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe69a939d0 a2=94 a3=2 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.704000 audit: BPF prog-id=153 op=UNLOAD Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit: BPF prog-id=154 op=LOAD Mar 17 18:50:40.826000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe69a93890 a2=40 a3=1 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.826000 audit: BPF prog-id=154 op=UNLOAD Mar 17 18:50:40.826000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.826000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe69a93960 a2=50 a3=7ffe69a93a40 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.835000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.835000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a938a0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.835000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe69a938d0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe69a937e0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a938f0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a938d0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a938c0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a938f0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe69a938d0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe69a938f0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe69a938c0 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe69a93930 a2=28 a3=0 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe69a936e0 a2=50 a3=1 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit: BPF prog-id=155 op=LOAD Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe69a936e0 a2=94 a3=5 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit: BPF prog-id=155 op=UNLOAD Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe69a93790 a2=50 a3=1 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe69a938b0 a2=4 a3=38 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { confidentiality } for pid=3747 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe69a93900 a2=94 a3=6 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.836000 audit[3747]: AVC avc: denied { confidentiality } for pid=3747 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:50:40.836000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe69a930b0 a2=94 a3=83 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.836000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { perfmon } for pid=3747 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe69a930b0 a2=94 a3=83 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe69a94af0 a2=10 a3=f1f00800 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe69a94990 a2=10 a3=3 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe69a94930 a2=10 a3=3 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.837000 audit[3747]: AVC avc: denied { bpf } for pid=3747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:40.837000 audit[3747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe69a94930 a2=10 a3=7 items=0 ppid=3609 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:40.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:50:40.844000 audit: BPF prog-id=150 op=UNLOAD Mar 17 18:50:41.219000 audit[3771]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:41.219000 audit[3771]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd460f89a0 a2=0 a3=7ffd460f898c items=0 ppid=3609 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:41.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:41.229000 audit[3772]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:41.229000 audit[3772]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffff7280da0 a2=0 a3=7ffff7280d8c items=0 ppid=3609 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:41.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:41.252000 audit[3773]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:41.252000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffec38eafa0 a2=0 a3=7ffec38eaf8c items=0 ppid=3609 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:41.252000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:41.291000 audit[3774]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:41.291000 audit[3774]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf0bebb20 a2=0 a3=7ffcf0bebb0c items=0 ppid=3609 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:41.291000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:41.706296 systemd-networkd[1552]: vxlan.calico: Gained IPv6LL Mar 17 18:50:43.388708 env[1393]: time="2025-03-17T18:50:43.388648674Z" level=info msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.432 [INFO][3801] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.433 [INFO][3801] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" iface="eth0" netns="/var/run/netns/cni-97c82756-3fbf-6e8b-209f-19c1ebb91c5e" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.433 [INFO][3801] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" iface="eth0" netns="/var/run/netns/cni-97c82756-3fbf-6e8b-209f-19c1ebb91c5e" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.433 [INFO][3801] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" iface="eth0" netns="/var/run/netns/cni-97c82756-3fbf-6e8b-209f-19c1ebb91c5e" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.433 [INFO][3801] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.434 [INFO][3801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.452 [INFO][3807] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.452 [INFO][3807] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.452 [INFO][3807] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.458 [WARNING][3807] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.458 [INFO][3807] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.461 [INFO][3807] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:43.467018 env[1393]: 2025-03-17 18:50:43.465 [INFO][3801] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:43.467763 env[1393]: time="2025-03-17T18:50:43.467717195Z" level=info msg="TearDown network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" successfully" Mar 17 18:50:43.467890 env[1393]: time="2025-03-17T18:50:43.467866595Z" level=info msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" returns successfully" Mar 17 18:50:43.470576 systemd[1]: run-netns-cni\x2d97c82756\x2d3fbf\x2d6e8b\x2d209f\x2d19c1ebb91c5e.mount: Deactivated successfully. Mar 17 18:50:43.473416 env[1393]: time="2025-03-17T18:50:43.473378418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dnzzl,Uid:e7d868b1-5177-4620-8f50-dbb00237cb1d,Namespace:calico-system,Attempt:1,}" Mar 17 18:50:43.623682 systemd-networkd[1552]: calib2ed4fdd474: Link UP Mar 17 18:50:43.636201 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:50:43.636311 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib2ed4fdd474: link becomes ready Mar 17 18:50:43.638540 systemd-networkd[1552]: calib2ed4fdd474: Gained carrier Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.556 [INFO][3814] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0 csi-node-driver- calico-system e7d868b1-5177-4620-8f50-dbb00237cb1d 791 0 2025-03-17 18:50:17 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d csi-node-driver-dnzzl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib2ed4fdd474 [] []}} ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.556 [INFO][3814] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.584 [INFO][3824] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" HandleID="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.592 [INFO][3824] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" HandleID="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319640), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"csi-node-driver-dnzzl", "timestamp":"2025-03-17 18:50:43.58464937 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.592 [INFO][3824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.592 [INFO][3824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.592 [INFO][3824] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.593 [INFO][3824] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.596 [INFO][3824] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.599 [INFO][3824] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.601 [INFO][3824] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.603 [INFO][3824] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.603 [INFO][3824] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.605 [INFO][3824] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.612 [INFO][3824] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.618 [INFO][3824] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.193/26] block=192.168.41.192/26 handle="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.618 [INFO][3824] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.193/26] handle="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.618 [INFO][3824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:43.662035 env[1393]: 2025-03-17 18:50:43.618 [INFO][3824] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.193/26] IPv6=[] ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" HandleID="k8s-pod-network.17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.620 [INFO][3814] cni-plugin/k8s.go 386: Populated endpoint ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7d868b1-5177-4620-8f50-dbb00237cb1d", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"csi-node-driver-dnzzl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib2ed4fdd474", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.620 [INFO][3814] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.193/32] ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.620 [INFO][3814] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib2ed4fdd474 ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.640 [INFO][3814] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.641 [INFO][3814] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7d868b1-5177-4620-8f50-dbb00237cb1d", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb", Pod:"csi-node-driver-dnzzl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib2ed4fdd474", MAC:"ca:8e:ec:aa:88:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:43.662925 env[1393]: 2025-03-17 18:50:43.659 [INFO][3814] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb" Namespace="calico-system" Pod="csi-node-driver-dnzzl" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:43.681652 env[1393]: time="2025-03-17T18:50:43.681402063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:43.681652 env[1393]: time="2025-03-17T18:50:43.681434863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:43.681652 env[1393]: time="2025-03-17T18:50:43.681444663Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:43.681652 env[1393]: time="2025-03-17T18:50:43.681587864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb pid=3850 runtime=io.containerd.runc.v2 Mar 17 18:50:43.704540 kernel: kauditd_printk_skb: 554 callbacks suppressed Mar 17 18:50:43.704648 kernel: audit: type=1325 audit(1742237443.688:1058): table=filter:104 family=2 entries=34 op=nft_register_chain pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:43.688000 audit[3855]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:43.688000 audit[3855]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe6a0e1d80 a2=0 a3=7ffe6a0e1d6c items=0 ppid=3609 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.722983 systemd[1]: Started cri-containerd-17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb.scope. Mar 17 18:50:43.737967 kernel: audit: type=1300 audit(1742237443.688:1058): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe6a0e1d80 a2=0 a3=7ffe6a0e1d6c items=0 ppid=3609 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.738072 kernel: audit: type=1327 audit(1742237443.688:1058): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:43.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.757169 kernel: audit: type=1400 audit(1742237443.743:1059): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.770099 kernel: audit: type=1400 audit(1742237443.743:1060): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.796021 kernel: audit: type=1400 audit(1742237443.743:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.796106 kernel: audit: type=1400 audit(1742237443.743:1062): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.808079 kernel: audit: type=1400 audit(1742237443.743:1063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.808117 kernel: audit: type=1400 audit(1742237443.743:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.824180 env[1393]: time="2025-03-17T18:50:43.824146343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dnzzl,Uid:e7d868b1-5177-4620-8f50-dbb00237cb1d,Namespace:calico-system,Attempt:1,} returns sandbox id \"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb\"" Mar 17 18:50:43.827770 env[1393]: time="2025-03-17T18:50:43.827627057Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.768000 audit: BPF prog-id=156 op=LOAD Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3850 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.834061 kernel: audit: type=1400 audit(1742237443.743:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636130653761383562313262653562363764326437333534346131 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3850 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636130653761383562313262653562363764326437333534346131 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.769000 audit: BPF prog-id=157 op=LOAD Mar 17 18:50:43.769000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00038a0b0 items=0 ppid=3850 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636130653761383562313262653562363764326437333534346131 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.781000 audit: BPF prog-id=158 op=LOAD Mar 17 18:50:43.781000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00038a0f8 items=0 ppid=3850 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636130653761383562313262653562363764326437333534346131 Mar 17 18:50:43.781000 audit: BPF prog-id=158 op=UNLOAD Mar 17 18:50:43.782000 audit: BPF prog-id=157 op=UNLOAD Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { perfmon } for pid=3862 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit[3862]: AVC avc: denied { bpf } for pid=3862 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:43.782000 audit: BPF prog-id=159 op=LOAD Mar 17 18:50:43.782000 audit[3862]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00038a508 items=0 ppid=3850 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636130653761383562313262653562363764326437333534346131 Mar 17 18:50:44.391312 env[1393]: time="2025-03-17T18:50:44.391105526Z" level=info msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" Mar 17 18:50:44.471330 systemd[1]: run-containerd-runc-k8s.io-17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb-runc.C6d84F.mount: Deactivated successfully. Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.441 [INFO][3899] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.441 [INFO][3899] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" iface="eth0" netns="/var/run/netns/cni-20e007af-0cbf-5814-ae87-3b0b1561c804" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.441 [INFO][3899] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" iface="eth0" netns="/var/run/netns/cni-20e007af-0cbf-5814-ae87-3b0b1561c804" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.442 [INFO][3899] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" iface="eth0" netns="/var/run/netns/cni-20e007af-0cbf-5814-ae87-3b0b1561c804" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.442 [INFO][3899] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.442 [INFO][3899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.464 [INFO][3905] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.464 [INFO][3905] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.464 [INFO][3905] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.470 [WARNING][3905] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.470 [INFO][3905] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.471 [INFO][3905] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:44.476083 env[1393]: 2025-03-17 18:50:44.474 [INFO][3899] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:44.477217 env[1393]: time="2025-03-17T18:50:44.477170571Z" level=info msg="TearDown network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" successfully" Mar 17 18:50:44.477350 env[1393]: time="2025-03-17T18:50:44.477329272Z" level=info msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" returns successfully" Mar 17 18:50:44.478337 env[1393]: time="2025-03-17T18:50:44.478303575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-bp7cw,Uid:f024ce9b-71cd-4457-9d10-6cdc40d182d1,Namespace:calico-apiserver,Attempt:1,}" Mar 17 18:50:44.480089 systemd[1]: run-netns-cni\x2d20e007af\x2d0cbf\x2d5814\x2dae87\x2d3b0b1561c804.mount: Deactivated successfully. Mar 17 18:50:44.646900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:50:44.647071 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3469bcb083a: link becomes ready Mar 17 18:50:44.643409 systemd-networkd[1552]: cali3469bcb083a: Link UP Mar 17 18:50:44.648553 systemd-networkd[1552]: cali3469bcb083a: Gained carrier Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.570 [INFO][3911] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0 calico-apiserver-6765df6b74- calico-apiserver f024ce9b-71cd-4457-9d10-6cdc40d182d1 799 0 2025-03-17 18:50:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6765df6b74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d calico-apiserver-6765df6b74-bp7cw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3469bcb083a [] []}} ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.570 [INFO][3911] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.598 [INFO][3923] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" HandleID="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.606 [INFO][3923] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" HandleID="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec320), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"calico-apiserver-6765df6b74-bp7cw", "timestamp":"2025-03-17 18:50:44.598529158 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.606 [INFO][3923] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.606 [INFO][3923] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.606 [INFO][3923] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.607 [INFO][3923] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.610 [INFO][3923] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.615 [INFO][3923] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.617 [INFO][3923] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.619 [INFO][3923] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.619 [INFO][3923] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.620 [INFO][3923] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8 Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.627 [INFO][3923] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.633 [INFO][3923] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.194/26] block=192.168.41.192/26 handle="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.633 [INFO][3923] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.194/26] handle="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.633 [INFO][3923] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:44.671443 env[1393]: 2025-03-17 18:50:44.633 [INFO][3923] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.194/26] IPv6=[] ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" HandleID="k8s-pod-network.cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.635 [INFO][3911] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"f024ce9b-71cd-4457-9d10-6cdc40d182d1", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"calico-apiserver-6765df6b74-bp7cw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3469bcb083a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.635 [INFO][3911] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.194/32] ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.635 [INFO][3911] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3469bcb083a ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.649 [INFO][3911] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.655 [INFO][3911] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"f024ce9b-71cd-4457-9d10-6cdc40d182d1", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8", Pod:"calico-apiserver-6765df6b74-bp7cw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3469bcb083a", MAC:"3e:c9:b2:ee:fd:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:44.672272 env[1393]: 2025-03-17 18:50:44.669 [INFO][3911] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-bp7cw" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:44.688000 audit[3942]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=3942 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:44.688000 audit[3942]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe5a0a9900 a2=0 a3=7ffe5a0a98ec items=0 ppid=3609 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:44.705883 env[1393]: time="2025-03-17T18:50:44.705799188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:44.706133 env[1393]: time="2025-03-17T18:50:44.705853488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:44.706133 env[1393]: time="2025-03-17T18:50:44.705868288Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:44.706133 env[1393]: time="2025-03-17T18:50:44.706032789Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8 pid=3949 runtime=io.containerd.runc.v2 Mar 17 18:50:44.727877 systemd[1]: Started cri-containerd-cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8.scope. Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.743000 audit: BPF prog-id=160 op=LOAD Mar 17 18:50:44.744000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.744000 audit[3960]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364323333616637353830646330306462373330343731376135666162 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364323333616637353830646330306462373330343731376135666162 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit: BPF prog-id=161 op=LOAD Mar 17 18:50:44.745000 audit[3960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000025550 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364323333616637353830646330306462373330343731376135666162 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit: BPF prog-id=162 op=LOAD Mar 17 18:50:44.745000 audit[3960]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025598 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364323333616637353830646330306462373330343731376135666162 Mar 17 18:50:44.745000 audit: BPF prog-id=162 op=UNLOAD Mar 17 18:50:44.745000 audit: BPF prog-id=161 op=UNLOAD Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:44.745000 audit: BPF prog-id=163 op=LOAD Mar 17 18:50:44.745000 audit[3960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000259a8 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:44.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364323333616637353830646330306462373330343731376135666162 Mar 17 18:50:44.772358 env[1393]: time="2025-03-17T18:50:44.772305455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-bp7cw,Uid:f024ce9b-71cd-4457-9d10-6cdc40d182d1,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8\"" Mar 17 18:50:45.226219 systemd-networkd[1552]: calib2ed4fdd474: Gained IPv6LL Mar 17 18:50:45.391468 env[1393]: time="2025-03-17T18:50:45.391422619Z" level=info msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" Mar 17 18:50:45.406862 env[1393]: time="2025-03-17T18:50:45.406820080Z" level=info msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" Mar 17 18:50:45.440739 env[1393]: time="2025-03-17T18:50:45.440689414Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:45.449014 env[1393]: time="2025-03-17T18:50:45.448953847Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:45.459917 env[1393]: time="2025-03-17T18:50:45.459884990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:45.465024 env[1393]: time="2025-03-17T18:50:45.464969310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:45.466085 env[1393]: time="2025-03-17T18:50:45.465530612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 18:50:45.471610 env[1393]: time="2025-03-17T18:50:45.469709429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 18:50:45.473090 env[1393]: time="2025-03-17T18:50:45.473057142Z" level=info msg="CreateContainer within sandbox \"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:50:45.519923 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1856428882.mount: Deactivated successfully. Mar 17 18:50:45.537171 env[1393]: time="2025-03-17T18:50:45.537121096Z" level=info msg="CreateContainer within sandbox \"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b132c3346dc61f611ce2b3ebb152e0db9aec7b680e68cbba57c2b5ab89b887b0\"" Mar 17 18:50:45.539664 env[1393]: time="2025-03-17T18:50:45.538810303Z" level=info msg="StartContainer for \"b132c3346dc61f611ce2b3ebb152e0db9aec7b680e68cbba57c2b5ab89b887b0\"" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.488 [INFO][4007] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.489 [INFO][4007] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" iface="eth0" netns="/var/run/netns/cni-e1fb326d-6ed8-4ae4-5bed-db5a1ac7c17e" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.489 [INFO][4007] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" iface="eth0" netns="/var/run/netns/cni-e1fb326d-6ed8-4ae4-5bed-db5a1ac7c17e" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.489 [INFO][4007] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" iface="eth0" netns="/var/run/netns/cni-e1fb326d-6ed8-4ae4-5bed-db5a1ac7c17e" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.489 [INFO][4007] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.489 [INFO][4007] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.527 [INFO][4027] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.528 [INFO][4027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.528 [INFO][4027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.540 [WARNING][4027] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.540 [INFO][4027] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.542 [INFO][4027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:45.548660 env[1393]: 2025-03-17 18:50:45.547 [INFO][4007] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:45.550341 env[1393]: time="2025-03-17T18:50:45.550285948Z" level=info msg="TearDown network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" successfully" Mar 17 18:50:45.550476 env[1393]: time="2025-03-17T18:50:45.550453849Z" level=info msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" returns successfully" Mar 17 18:50:45.553370 systemd[1]: run-netns-cni\x2de1fb326d\x2d6ed8\x2d4ae4\x2d5bed\x2ddb5a1ac7c17e.mount: Deactivated successfully. Mar 17 18:50:45.573707 env[1393]: time="2025-03-17T18:50:45.573669341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b4c557cd-z582z,Uid:8aa558d3-f357-4b87-9397-bc72517eb6b8,Namespace:calico-system,Attempt:1,}" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" iface="eth0" netns="/var/run/netns/cni-c5662b80-cfdc-e726-7503-2476122005bb" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" iface="eth0" netns="/var/run/netns/cni-c5662b80-cfdc-e726-7503-2476122005bb" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" iface="eth0" netns="/var/run/netns/cni-c5662b80-cfdc-e726-7503-2476122005bb" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.483 [INFO][4012] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.537 [INFO][4023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.537 [INFO][4023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.542 [INFO][4023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.548 [WARNING][4023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.549 [INFO][4023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.551 [INFO][4023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:45.578214 env[1393]: 2025-03-17 18:50:45.576 [INFO][4012] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:45.579113 env[1393]: time="2025-03-17T18:50:45.579074162Z" level=info msg="TearDown network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" successfully" Mar 17 18:50:45.579613 systemd[1]: Started cri-containerd-b132c3346dc61f611ce2b3ebb152e0db9aec7b680e68cbba57c2b5ab89b887b0.scope. Mar 17 18:50:45.582134 env[1393]: time="2025-03-17T18:50:45.582101874Z" level=info msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" returns successfully" Mar 17 18:50:45.589932 env[1393]: time="2025-03-17T18:50:45.589893305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wvc6w,Uid:e1039987-282f-4b16-82a7-62cee169ff89,Namespace:kube-system,Attempt:1,}" Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff84ee9c628 items=0 ppid=3850 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333263333334366463363166363131636532623365626231353265 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit: BPF prog-id=164 op=LOAD Mar 17 18:50:45.602000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000388a38 items=0 ppid=3850 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333263333334366463363166363131636532623365626231353265 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.602000 audit: BPF prog-id=165 op=LOAD Mar 17 18:50:45.602000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000388a88 items=0 ppid=3850 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333263333334366463363166363131636532623365626231353265 Mar 17 18:50:45.603000 audit: BPF prog-id=165 op=UNLOAD Mar 17 18:50:45.603000 audit: BPF prog-id=164 op=UNLOAD Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.603000 audit: BPF prog-id=166 op=LOAD Mar 17 18:50:45.603000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000388b18 items=0 ppid=3850 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231333263333334366463363166363131636532623365626231353265 Mar 17 18:50:45.623404 env[1393]: time="2025-03-17T18:50:45.623308737Z" level=info msg="StartContainer for \"b132c3346dc61f611ce2b3ebb152e0db9aec7b680e68cbba57c2b5ab89b887b0\" returns successfully" Mar 17 18:50:45.783198 systemd-networkd[1552]: cali66d91e9063e: Link UP Mar 17 18:50:45.784127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:50:45.791470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali66d91e9063e: link becomes ready Mar 17 18:50:45.791609 systemd-networkd[1552]: cali66d91e9063e: Gained carrier Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.692 [INFO][4068] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0 calico-kube-controllers-57b4c557cd- calico-system 8aa558d3-f357-4b87-9397-bc72517eb6b8 810 0 2025-03-17 18:50:17 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:57b4c557cd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d calico-kube-controllers-57b4c557cd-z582z eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali66d91e9063e [] []}} ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.692 [INFO][4068] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.738 [INFO][4092] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" HandleID="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.747 [INFO][4092] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" HandleID="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000360960), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"calico-kube-controllers-57b4c557cd-z582z", "timestamp":"2025-03-17 18:50:45.738624994 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.747 [INFO][4092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.747 [INFO][4092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.747 [INFO][4092] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.749 [INFO][4092] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.755 [INFO][4092] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.759 [INFO][4092] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.760 [INFO][4092] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.762 [INFO][4092] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.762 [INFO][4092] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.763 [INFO][4092] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950 Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.769 [INFO][4092] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.775 [INFO][4092] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.195/26] block=192.168.41.192/26 handle="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.775 [INFO][4092] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.195/26] handle="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.775 [INFO][4092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:45.820698 env[1393]: 2025-03-17 18:50:45.775 [INFO][4092] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.195/26] IPv6=[] ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" HandleID="k8s-pod-network.4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.776 [INFO][4068] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0", GenerateName:"calico-kube-controllers-57b4c557cd-", Namespace:"calico-system", SelfLink:"", UID:"8aa558d3-f357-4b87-9397-bc72517eb6b8", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b4c557cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"calico-kube-controllers-57b4c557cd-z582z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66d91e9063e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.776 [INFO][4068] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.195/32] ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.776 [INFO][4068] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali66d91e9063e ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.803 [INFO][4068] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.804 [INFO][4068] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0", GenerateName:"calico-kube-controllers-57b4c557cd-", Namespace:"calico-system", SelfLink:"", UID:"8aa558d3-f357-4b87-9397-bc72517eb6b8", ResourceVersion:"810", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b4c557cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950", Pod:"calico-kube-controllers-57b4c557cd-z582z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66d91e9063e", MAC:"46:88:71:48:28:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:45.821677 env[1393]: 2025-03-17 18:50:45.816 [INFO][4068] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950" Namespace="calico-system" Pod="calico-kube-controllers-57b4c557cd-z582z" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:45.841000 audit[4118]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4118 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:45.841000 audit[4118]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffecd4f8aa0 a2=0 a3=7ffecd4f8a8c items=0 ppid=3609 pid=4118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.841000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:45.846443 systemd-networkd[1552]: cali8201dc162ce: Link UP Mar 17 18:50:45.854519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8201dc162ce: link becomes ready Mar 17 18:50:45.854774 systemd-networkd[1552]: cali8201dc162ce: Gained carrier Mar 17 18:50:45.860025 env[1393]: time="2025-03-17T18:50:45.859949075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:45.860128 env[1393]: time="2025-03-17T18:50:45.860039175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:45.860128 env[1393]: time="2025-03-17T18:50:45.860070875Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:45.860234 env[1393]: time="2025-03-17T18:50:45.860209776Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950 pid=4128 runtime=io.containerd.runc.v2 Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.693 [INFO][4077] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0 coredns-7db6d8ff4d- kube-system e1039987-282f-4b16-82a7-62cee169ff89 809 0 2025-03-17 18:50:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d coredns-7db6d8ff4d-wvc6w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8201dc162ce [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.694 [INFO][4077] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.735 [INFO][4093] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" HandleID="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.750 [INFO][4093] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" HandleID="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334dd0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"coredns-7db6d8ff4d-wvc6w", "timestamp":"2025-03-17 18:50:45.735832783 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.751 [INFO][4093] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.775 [INFO][4093] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.775 [INFO][4093] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.787 [INFO][4093] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.792 [INFO][4093] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.804 [INFO][4093] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.806 [INFO][4093] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.818 [INFO][4093] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.818 [INFO][4093] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.822 [INFO][4093] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94 Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.832 [INFO][4093] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.841 [INFO][4093] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.196/26] block=192.168.41.192/26 handle="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.842 [INFO][4093] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.196/26] handle="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.842 [INFO][4093] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:45.881313 env[1393]: 2025-03-17 18:50:45.842 [INFO][4093] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.196/26] IPv6=[] ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" HandleID="k8s-pod-network.0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.844 [INFO][4077] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"e1039987-282f-4b16-82a7-62cee169ff89", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"coredns-7db6d8ff4d-wvc6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8201dc162ce", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.844 [INFO][4077] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.196/32] ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.844 [INFO][4077] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8201dc162ce ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.847 [INFO][4077] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.862 [INFO][4077] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"e1039987-282f-4b16-82a7-62cee169ff89", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94", Pod:"coredns-7db6d8ff4d-wvc6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8201dc162ce", MAC:"0a:bd:f8:66:75:02", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:45.882298 env[1393]: 2025-03-17 18:50:45.879 [INFO][4077] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94" Namespace="kube-system" Pod="coredns-7db6d8ff4d-wvc6w" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:45.890273 systemd[1]: Started cri-containerd-4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950.scope. Mar 17 18:50:45.909000 audit[4167]: NETFILTER_CFG table=filter:107 family=2 entries=46 op=nft_register_chain pid=4167 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:45.909000 audit[4167]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffceb18dd50 a2=0 a3=7ffceb18dd3c items=0 ppid=3609 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.909000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.917000 audit: BPF prog-id=167 op=LOAD Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4128 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383136626235376365613439376137313365376264633537393037 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4128 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383136626235376365613439376137313365376264633537393037 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit: BPF prog-id=168 op=LOAD Mar 17 18:50:45.918000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9f30 items=0 ppid=4128 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383136626235376365613439376137313365376264633537393037 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit: BPF prog-id=169 op=LOAD Mar 17 18:50:45.918000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9f78 items=0 ppid=4128 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383136626235376365613439376137313365376264633537393037 Mar 17 18:50:45.918000 audit: BPF prog-id=169 op=UNLOAD Mar 17 18:50:45.918000 audit: BPF prog-id=168 op=UNLOAD Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.918000 audit: BPF prog-id=170 op=LOAD Mar 17 18:50:45.918000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000312388 items=0 ppid=4128 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383136626235376365613439376137313365376264633537393037 Mar 17 18:50:45.926399 env[1393]: time="2025-03-17T18:50:45.926333838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:45.926526 env[1393]: time="2025-03-17T18:50:45.926418638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:45.926526 env[1393]: time="2025-03-17T18:50:45.926450138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:45.926659 env[1393]: time="2025-03-17T18:50:45.926620939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94 pid=4174 runtime=io.containerd.runc.v2 Mar 17 18:50:45.944727 systemd[1]: Started cri-containerd-0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94.scope. Mar 17 18:50:45.964276 env[1393]: time="2025-03-17T18:50:45.964233688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b4c557cd-z582z,Uid:8aa558d3-f357-4b87-9397-bc72517eb6b8,Namespace:calico-system,Attempt:1,} returns sandbox id \"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950\"" Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit: BPF prog-id=171 op=LOAD Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4174 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646465326638336636613439326136373339383031346431643235 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4174 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646465326638336636613439326136373339383031346431643235 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.970000 audit: BPF prog-id=172 op=LOAD Mar 17 18:50:45.970000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00021ea80 items=0 ppid=4174 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646465326638336636613439326136373339383031346431643235 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit: BPF prog-id=173 op=LOAD Mar 17 18:50:45.971000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00021eac8 items=0 ppid=4174 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646465326638336636613439326136373339383031346431643235 Mar 17 18:50:45.971000 audit: BPF prog-id=173 op=UNLOAD Mar 17 18:50:45.971000 audit: BPF prog-id=172 op=UNLOAD Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { perfmon } for pid=4182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit[4182]: AVC avc: denied { bpf } for pid=4182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:45.971000 audit: BPF prog-id=174 op=LOAD Mar 17 18:50:45.971000 audit[4182]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00021eed8 items=0 ppid=4174 pid=4182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:45.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062646465326638336636613439326136373339383031346431643235 Mar 17 18:50:45.999221 env[1393]: time="2025-03-17T18:50:45.999172426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-wvc6w,Uid:e1039987-282f-4b16-82a7-62cee169ff89,Namespace:kube-system,Attempt:1,} returns sandbox id \"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94\"" Mar 17 18:50:46.002370 env[1393]: time="2025-03-17T18:50:46.002330439Z" level=info msg="CreateContainer within sandbox \"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 18:50:46.032990 env[1393]: time="2025-03-17T18:50:46.032953759Z" level=info msg="CreateContainer within sandbox \"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c47e3eb3b25adee85db8da22288681a16859b86d75d764656e3c736cce89d1bf\"" Mar 17 18:50:46.038030 env[1393]: time="2025-03-17T18:50:46.034349664Z" level=info msg="StartContainer for \"c47e3eb3b25adee85db8da22288681a16859b86d75d764656e3c736cce89d1bf\"" Mar 17 18:50:46.056302 systemd[1]: Started cri-containerd-c47e3eb3b25adee85db8da22288681a16859b86d75d764656e3c736cce89d1bf.scope. Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.070000 audit: BPF prog-id=175 op=LOAD Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4174 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376533656233623235616465653835646238646132323238383638 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4174 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376533656233623235616465653835646238646132323238383638 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit: BPF prog-id=176 op=LOAD Mar 17 18:50:46.071000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000303de0 items=0 ppid=4174 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376533656233623235616465653835646238646132323238383638 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit: BPF prog-id=177 op=LOAD Mar 17 18:50:46.071000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000303e28 items=0 ppid=4174 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376533656233623235616465653835646238646132323238383638 Mar 17 18:50:46.071000 audit: BPF prog-id=177 op=UNLOAD Mar 17 18:50:46.071000 audit: BPF prog-id=176 op=UNLOAD Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.071000 audit: BPF prog-id=178 op=LOAD Mar 17 18:50:46.071000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000350238 items=0 ppid=4174 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376533656233623235616465653835646238646132323238383638 Mar 17 18:50:46.090714 env[1393]: time="2025-03-17T18:50:46.090334683Z" level=info msg="StartContainer for \"c47e3eb3b25adee85db8da22288681a16859b86d75d764656e3c736cce89d1bf\" returns successfully" Mar 17 18:50:46.250124 systemd-networkd[1552]: cali3469bcb083a: Gained IPv6LL Mar 17 18:50:46.392047 env[1393]: time="2025-03-17T18:50:46.390982060Z" level=info msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" Mar 17 18:50:46.473712 systemd[1]: run-netns-cni\x2dc5662b80\x2dcfdc\x2de726\x2d7503\x2d2476122005bb.mount: Deactivated successfully. Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" iface="eth0" netns="/var/run/netns/cni-7d380d6f-c242-e247-743b-8d2e17b82261" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" iface="eth0" netns="/var/run/netns/cni-7d380d6f-c242-e247-743b-8d2e17b82261" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" iface="eth0" netns="/var/run/netns/cni-7d380d6f-c242-e247-743b-8d2e17b82261" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.440 [INFO][4271] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.462 [INFO][4277] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.463 [INFO][4277] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.463 [INFO][4277] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.476 [WARNING][4277] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.476 [INFO][4277] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.478 [INFO][4277] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:46.480260 env[1393]: 2025-03-17 18:50:46.479 [INFO][4271] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:46.481756 env[1393]: time="2025-03-17T18:50:46.480472210Z" level=info msg="TearDown network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" successfully" Mar 17 18:50:46.481756 env[1393]: time="2025-03-17T18:50:46.480509010Z" level=info msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" returns successfully" Mar 17 18:50:46.482904 systemd[1]: run-netns-cni\x2d7d380d6f\x2dc242\x2de247\x2d743b\x2d8d2e17b82261.mount: Deactivated successfully. Mar 17 18:50:46.484329 env[1393]: time="2025-03-17T18:50:46.484295525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fkltq,Uid:8d640bba-0229-4c6f-83a6-c6475a264dc8,Namespace:kube-system,Attempt:1,}" Mar 17 18:50:46.653214 kubelet[2493]: I0317 18:50:46.653079 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-wvc6w" podStartSLOduration=37.653055185 podStartE2EDuration="37.653055185s" podCreationTimestamp="2025-03-17 18:50:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:50:46.637731825 +0000 UTC m=+50.371100837" watchObservedRunningTime="2025-03-17 18:50:46.653055185 +0000 UTC m=+50.386424197" Mar 17 18:50:46.662000 audit[4303]: NETFILTER_CFG table=filter:108 family=2 entries=16 op=nft_register_rule pid=4303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:46.662000 audit[4303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3ccdb330 a2=0 a3=7fff3ccdb31c items=0 ppid=2630 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:46.668000 audit[4303]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:46.668000 audit[4303]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff3ccdb330 a2=0 a3=0 items=0 ppid=2630 pid=4303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:46.683000 audit[4305]: NETFILTER_CFG table=filter:110 family=2 entries=13 op=nft_register_rule pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:46.683000 audit[4305]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd61e6f710 a2=0 a3=7ffd61e6f6fc items=0 ppid=2630 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:46.688000 audit[4305]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4305 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:46.688000 audit[4305]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd61e6f710 a2=0 a3=7ffd61e6f6fc items=0 ppid=2630 pid=4305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:46.706094 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali16af64e1f5e: link becomes ready Mar 17 18:50:46.706506 systemd-networkd[1552]: cali16af64e1f5e: Link UP Mar 17 18:50:46.708255 systemd-networkd[1552]: cali16af64e1f5e: Gained carrier Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.589 [INFO][4283] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0 coredns-7db6d8ff4d- kube-system 8d640bba-0229-4c6f-83a6-c6475a264dc8 827 0 2025-03-17 18:50:09 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d coredns-7db6d8ff4d-fkltq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali16af64e1f5e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.590 [INFO][4283] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.619 [INFO][4295] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" HandleID="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.634 [INFO][4295] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" HandleID="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003195e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"coredns-7db6d8ff4d-fkltq", "timestamp":"2025-03-17 18:50:46.619035452 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.634 [INFO][4295] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.634 [INFO][4295] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.634 [INFO][4295] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.636 [INFO][4295] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.642 [INFO][4295] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.651 [INFO][4295] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.659 [INFO][4295] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.670 [INFO][4295] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.670 [INFO][4295] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.672 [INFO][4295] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12 Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.679 [INFO][4295] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.695 [INFO][4295] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.197/26] block=192.168.41.192/26 handle="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.695 [INFO][4295] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.197/26] handle="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.695 [INFO][4295] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:46.719846 env[1393]: 2025-03-17 18:50:46.695 [INFO][4295] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.197/26] IPv6=[] ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" HandleID="k8s-pod-network.a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.697 [INFO][4283] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8d640bba-0229-4c6f-83a6-c6475a264dc8", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"coredns-7db6d8ff4d-fkltq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali16af64e1f5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.698 [INFO][4283] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.197/32] ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.698 [INFO][4283] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali16af64e1f5e ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.700 [INFO][4283] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.701 [INFO][4283] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8d640bba-0229-4c6f-83a6-c6475a264dc8", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12", Pod:"coredns-7db6d8ff4d-fkltq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali16af64e1f5e", MAC:"1a:82:3d:12:1c:67", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:46.720869 env[1393]: 2025-03-17 18:50:46.717 [INFO][4283] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fkltq" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:46.766368 env[1393]: time="2025-03-17T18:50:46.766261328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:46.766368 env[1393]: time="2025-03-17T18:50:46.766317229Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:46.766631 env[1393]: time="2025-03-17T18:50:46.766342529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:46.766631 env[1393]: time="2025-03-17T18:50:46.766503229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12 pid=4327 runtime=io.containerd.runc.v2 Mar 17 18:50:46.780000 audit[4333]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:46.780000 audit[4333]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffd6a556050 a2=0 a3=7ffd6a55603c items=0 ppid=3609 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.780000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:46.818398 systemd[1]: Started cri-containerd-a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12.scope. Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.852000 audit: BPF prog-id=179 op=LOAD Mar 17 18:50:46.854000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.854000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4327 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633235633739623236363136323564616136646235336435356237 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4327 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633235633739623236363136323564616136646235336435356237 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.855000 audit: BPF prog-id=180 op=LOAD Mar 17 18:50:46.855000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009d5d0 items=0 ppid=4327 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633235633739623236363136323564616136646235336435356237 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.856000 audit: BPF prog-id=181 op=LOAD Mar 17 18:50:46.856000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009d618 items=0 ppid=4327 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633235633739623236363136323564616136646235336435356237 Mar 17 18:50:46.857000 audit: BPF prog-id=181 op=UNLOAD Mar 17 18:50:46.857000 audit: BPF prog-id=180 op=UNLOAD Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:46.857000 audit: BPF prog-id=182 op=LOAD Mar 17 18:50:46.857000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009da28 items=0 ppid=4327 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:46.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131633235633739623236363136323564616136646235336435356237 Mar 17 18:50:46.908087 env[1393]: time="2025-03-17T18:50:46.903906067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fkltq,Uid:8d640bba-0229-4c6f-83a6-c6475a264dc8,Namespace:kube-system,Attempt:1,} returns sandbox id \"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12\"" Mar 17 18:50:46.914193 env[1393]: time="2025-03-17T18:50:46.913949506Z" level=info msg="CreateContainer within sandbox \"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 18:50:46.954164 env[1393]: time="2025-03-17T18:50:46.954114364Z" level=info msg="CreateContainer within sandbox \"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6f4e257759f7e028b3dd3e4395c3ecc04d7e2ccb5cb117cb23c366ac26614dad\"" Mar 17 18:50:46.956770 env[1393]: time="2025-03-17T18:50:46.956638473Z" level=info msg="StartContainer for \"6f4e257759f7e028b3dd3e4395c3ecc04d7e2ccb5cb117cb23c366ac26614dad\"" Mar 17 18:50:46.988938 systemd[1]: Started cri-containerd-6f4e257759f7e028b3dd3e4395c3ecc04d7e2ccb5cb117cb23c366ac26614dad.scope. Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.004000 audit: BPF prog-id=183 op=LOAD Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4327 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346532353737353966376530323862336464336534333935633365 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4327 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346532353737353966376530323862336464336534333935633365 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit: BPF prog-id=184 op=LOAD Mar 17 18:50:47.005000 audit[4371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00036fc40 items=0 ppid=4327 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346532353737353966376530323862336464336534333935633365 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.005000 audit: BPF prog-id=185 op=LOAD Mar 17 18:50:47.005000 audit[4371]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00036fc88 items=0 ppid=4327 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346532353737353966376530323862336464336534333935633365 Mar 17 18:50:47.005000 audit: BPF prog-id=185 op=UNLOAD Mar 17 18:50:47.005000 audit: BPF prog-id=184 op=UNLOAD Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { perfmon } for pid=4371 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit[4371]: AVC avc: denied { bpf } for pid=4371 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:47.006000 audit: BPF prog-id=186 op=LOAD Mar 17 18:50:47.006000 audit[4371]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c6098 items=0 ppid=4327 pid=4371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346532353737353966376530323862336464336534333935633365 Mar 17 18:50:47.043301 env[1393]: time="2025-03-17T18:50:47.043247010Z" level=info msg="StartContainer for \"6f4e257759f7e028b3dd3e4395c3ecc04d7e2ccb5cb117cb23c366ac26614dad\" returns successfully" Mar 17 18:50:47.390989 env[1393]: time="2025-03-17T18:50:47.390943655Z" level=info msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" Mar 17 18:50:47.466130 systemd-networkd[1552]: cali66d91e9063e: Gained IPv6LL Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.511 [INFO][4417] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.511 [INFO][4417] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" iface="eth0" netns="/var/run/netns/cni-0a7f0eed-bc0e-bb33-d2f6-8f5aeb70dae7" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.511 [INFO][4417] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" iface="eth0" netns="/var/run/netns/cni-0a7f0eed-bc0e-bb33-d2f6-8f5aeb70dae7" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.511 [INFO][4417] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" iface="eth0" netns="/var/run/netns/cni-0a7f0eed-bc0e-bb33-d2f6-8f5aeb70dae7" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.511 [INFO][4417] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.512 [INFO][4417] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.546 [INFO][4423] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.547 [INFO][4423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.547 [INFO][4423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.560 [WARNING][4423] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.560 [INFO][4423] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.563 [INFO][4423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:47.566074 env[1393]: 2025-03-17 18:50:47.564 [INFO][4417] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:47.573912 systemd[1]: run-netns-cni\x2d0a7f0eed\x2dbc0e\x2dbb33\x2dd2f6\x2d8f5aeb70dae7.mount: Deactivated successfully. Mar 17 18:50:47.575523 env[1393]: time="2025-03-17T18:50:47.575484969Z" level=info msg="TearDown network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" successfully" Mar 17 18:50:47.575635 env[1393]: time="2025-03-17T18:50:47.575617369Z" level=info msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" returns successfully" Mar 17 18:50:47.577384 env[1393]: time="2025-03-17T18:50:47.577330076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-2rg6f,Uid:247e8772-f8ae-45ef-b4a2-6a845e9d9c87,Namespace:calico-apiserver,Attempt:1,}" Mar 17 18:50:47.594209 systemd-networkd[1552]: cali8201dc162ce: Gained IPv6LL Mar 17 18:50:47.656472 kubelet[2493]: I0317 18:50:47.654197 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-fkltq" podStartSLOduration=38.654175573 podStartE2EDuration="38.654175573s" podCreationTimestamp="2025-03-17 18:50:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 18:50:47.650203258 +0000 UTC m=+51.383572370" watchObservedRunningTime="2025-03-17 18:50:47.654175573 +0000 UTC m=+51.387544585" Mar 17 18:50:47.720000 audit[4442]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:47.720000 audit[4442]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffda0dce3e0 a2=0 a3=7ffda0dce3cc items=0 ppid=2630 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:47.725000 audit[4442]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:47.725000 audit[4442]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffda0dce3e0 a2=0 a3=7ffda0dce3cc items=0 ppid=2630 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:47.853841 systemd-networkd[1552]: cali9150468dea9: Link UP Mar 17 18:50:47.865524 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:50:47.865622 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9150468dea9: link becomes ready Mar 17 18:50:47.869265 systemd-networkd[1552]: cali9150468dea9: Gained carrier Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.727 [INFO][4430] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0 calico-apiserver-6765df6b74- calico-apiserver 247e8772-f8ae-45ef-b4a2-6a845e9d9c87 844 0 2025-03-17 18:50:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6765df6b74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-a-1304b8c80d calico-apiserver-6765df6b74-2rg6f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9150468dea9 [] []}} ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.727 [INFO][4430] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.803 [INFO][4443] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" HandleID="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.811 [INFO][4443] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" HandleID="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319930), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-a-1304b8c80d", "pod":"calico-apiserver-6765df6b74-2rg6f", "timestamp":"2025-03-17 18:50:47.801414242 +0000 UTC"}, Hostname:"ci-3510.3.7-a-1304b8c80d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.811 [INFO][4443] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.811 [INFO][4443] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.811 [INFO][4443] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-1304b8c80d' Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.812 [INFO][4443] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.816 [INFO][4443] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.820 [INFO][4443] ipam/ipam.go 489: Trying affinity for 192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.822 [INFO][4443] ipam/ipam.go 155: Attempting to load block cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.825 [INFO][4443] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.41.192/26 host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.825 [INFO][4443] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.41.192/26 handle="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.826 [INFO][4443] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9 Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.834 [INFO][4443] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.41.192/26 handle="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.846 [INFO][4443] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.41.198/26] block=192.168.41.192/26 handle="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.846 [INFO][4443] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.41.198/26] handle="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" host="ci-3510.3.7-a-1304b8c80d" Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.846 [INFO][4443] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:47.885198 env[1393]: 2025-03-17 18:50:47.846 [INFO][4443] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.41.198/26] IPv6=[] ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" HandleID="k8s-pod-network.fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.849 [INFO][4430] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"247e8772-f8ae-45ef-b4a2-6a845e9d9c87", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"", Pod:"calico-apiserver-6765df6b74-2rg6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9150468dea9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.849 [INFO][4430] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.41.198/32] ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.849 [INFO][4430] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9150468dea9 ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.870 [INFO][4430] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.870 [INFO][4430] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"247e8772-f8ae-45ef-b4a2-6a845e9d9c87", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9", Pod:"calico-apiserver-6765df6b74-2rg6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9150468dea9", MAC:"92:ea:36:13:71:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:47.886400 env[1393]: 2025-03-17 18:50:47.882 [INFO][4430] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9" Namespace="calico-apiserver" Pod="calico-apiserver-6765df6b74-2rg6f" WorkloadEndpoint="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:47.904000 audit[4458]: NETFILTER_CFG table=filter:115 family=2 entries=50 op=nft_register_chain pid=4458 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:50:47.904000 audit[4458]: SYSCALL arch=c000003e syscall=46 success=yes exit=25080 a0=3 a1=7ffe8e7a05a0 a2=0 a3=7ffe8e7a058c items=0 ppid=3609 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:47.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:50:47.940669 env[1393]: time="2025-03-17T18:50:47.939264076Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:50:47.940834 env[1393]: time="2025-03-17T18:50:47.939317576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:50:47.940834 env[1393]: time="2025-03-17T18:50:47.939331076Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:50:47.943149 env[1393]: time="2025-03-17T18:50:47.943100490Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9 pid=4471 runtime=io.containerd.runc.v2 Mar 17 18:50:47.978237 systemd-networkd[1552]: cali16af64e1f5e: Gained IPv6LL Mar 17 18:50:47.982775 systemd[1]: Started cri-containerd-fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9.scope. Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.106000 audit: BPF prog-id=187 op=LOAD Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4471 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393861336532303737356634646535323764643466363538613966 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4471 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393861336532303737356634646535323764643466363538613966 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.107000 audit: BPF prog-id=188 op=LOAD Mar 17 18:50:48.107000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000251a0 items=0 ppid=4471 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393861336532303737356634646535323764643466363538613966 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.108000 audit: BPF prog-id=189 op=LOAD Mar 17 18:50:48.108000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000251e8 items=0 ppid=4471 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393861336532303737356634646535323764643466363538613966 Mar 17 18:50:48.109000 audit: BPF prog-id=189 op=UNLOAD Mar 17 18:50:48.109000 audit: BPF prog-id=188 op=UNLOAD Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.109000 audit: BPF prog-id=190 op=LOAD Mar 17 18:50:48.109000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000255f8 items=0 ppid=4471 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664393861336532303737356634646535323764643466363538613966 Mar 17 18:50:48.148738 env[1393]: time="2025-03-17T18:50:48.148694479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6765df6b74-2rg6f,Uid:247e8772-f8ae-45ef-b4a2-6a845e9d9c87,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9\"" Mar 17 18:50:48.750000 audit[4507]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:48.757044 kernel: kauditd_printk_skb: 525 callbacks suppressed Mar 17 18:50:48.757145 kernel: audit: type=1325 audit(1742237448.750:1220): table=filter:116 family=2 entries=10 op=nft_register_rule pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:48.750000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5b9dfdf0 a2=0 a3=7fff5b9dfddc items=0 ppid=2630 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.771707 env[1393]: time="2025-03-17T18:50:48.771662760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:48.781801 env[1393]: time="2025-03-17T18:50:48.781764999Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:48.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:48.785661 env[1393]: time="2025-03-17T18:50:48.785636013Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:48.790470 env[1393]: time="2025-03-17T18:50:48.790444432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:48.790811 env[1393]: time="2025-03-17T18:50:48.790787433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 18:50:48.793582 kernel: audit: type=1300 audit(1742237448.750:1220): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5b9dfdf0 a2=0 a3=7fff5b9dfddc items=0 ppid=2630 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.793652 kernel: audit: type=1327 audit(1742237448.750:1220): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:48.794217 env[1393]: time="2025-03-17T18:50:48.794188046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:50:48.802894 env[1393]: time="2025-03-17T18:50:48.802856479Z" level=info msg="CreateContainer within sandbox \"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 18:50:48.820000 audit[4507]: NETFILTER_CFG table=nat:117 family=2 entries=56 op=nft_register_chain pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:48.820000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff5b9dfdf0 a2=0 a3=7fff5b9dfddc items=0 ppid=2630 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.849228 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3448193043.mount: Deactivated successfully. Mar 17 18:50:48.851748 kernel: audit: type=1325 audit(1742237448.820:1221): table=nat:117 family=2 entries=56 op=nft_register_chain pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:48.851835 kernel: audit: type=1300 audit(1742237448.820:1221): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff5b9dfdf0 a2=0 a3=7fff5b9dfddc items=0 ppid=2630 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:48.860922 kernel: audit: type=1327 audit(1742237448.820:1221): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:48.875981 env[1393]: time="2025-03-17T18:50:48.875950459Z" level=info msg="CreateContainer within sandbox \"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"504c2672f08c7e5e92db8400fe5d72ba3c6ff26240fe864090c5e84311f71d0c\"" Mar 17 18:50:48.878628 env[1393]: time="2025-03-17T18:50:48.878061067Z" level=info msg="StartContainer for \"504c2672f08c7e5e92db8400fe5d72ba3c6ff26240fe864090c5e84311f71d0c\"" Mar 17 18:50:48.906309 systemd[1]: Started cri-containerd-504c2672f08c7e5e92db8400fe5d72ba3c6ff26240fe864090c5e84311f71d0c.scope. Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.943348 kernel: audit: type=1400 audit(1742237448.916:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.943464 kernel: audit: type=1400 audit(1742237448.916:1223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.968394 kernel: audit: type=1400 audit(1742237448.916:1224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.968508 kernel: audit: type=1400 audit(1742237448.916:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.929000 audit: BPF prog-id=191 op=LOAD Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3949 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530346332363732663038633765356539326462383430306665356437 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3949 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530346332363732663038633765356539326462383430306665356437 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.935000 audit: BPF prog-id=192 op=LOAD Mar 17 18:50:48.935000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000382d20 items=0 ppid=3949 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530346332363732663038633765356539326462383430306665356437 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit: BPF prog-id=193 op=LOAD Mar 17 18:50:48.967000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000382d68 items=0 ppid=3949 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530346332363732663038633765356539326462383430306665356437 Mar 17 18:50:48.967000 audit: BPF prog-id=193 op=UNLOAD Mar 17 18:50:48.967000 audit: BPF prog-id=192 op=UNLOAD Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:48.967000 audit: BPF prog-id=194 op=LOAD Mar 17 18:50:48.967000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000383178 items=0 ppid=3949 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:48.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530346332363732663038633765356539326462383430306665356437 Mar 17 18:50:49.003804 env[1393]: time="2025-03-17T18:50:49.003700747Z" level=info msg="StartContainer for \"504c2672f08c7e5e92db8400fe5d72ba3c6ff26240fe864090c5e84311f71d0c\" returns successfully" Mar 17 18:50:49.657088 kubelet[2493]: I0317 18:50:49.657024 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6765df6b74-bp7cw" podStartSLOduration=28.638389837 podStartE2EDuration="32.656989815s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:44.773800561 +0000 UTC m=+48.507169573" lastFinishedPulling="2025-03-17 18:50:48.792400539 +0000 UTC m=+52.525769551" observedRunningTime="2025-03-17 18:50:49.656477413 +0000 UTC m=+53.389846425" watchObservedRunningTime="2025-03-17 18:50:49.656989815 +0000 UTC m=+53.390358827" Mar 17 18:50:49.674000 audit[4546]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:49.674000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffd9242bc0 a2=0 a3=7fffd9242bac items=0 ppid=2630 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:49.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:49.678000 audit[4546]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:49.678000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffd9242bc0 a2=0 a3=7fffd9242bac items=0 ppid=2630 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:49.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:49.835243 systemd-networkd[1552]: cali9150468dea9: Gained IPv6LL Mar 17 18:50:50.009000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.361776360/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c195 tclass=file permissive=0 Mar 17 18:50:50.009000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000994cc0 a2=fc6 a3=0 items=0 ppid=3949 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 key=(null) Mar 17 18:50:50.009000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:50:50.404238 env[1393]: time="2025-03-17T18:50:50.403754420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:50.411641 env[1393]: time="2025-03-17T18:50:50.411604549Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:50.416083 env[1393]: time="2025-03-17T18:50:50.416051066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:50.420406 env[1393]: time="2025-03-17T18:50:50.420361682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:50.420829 env[1393]: time="2025-03-17T18:50:50.420800084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 18:50:50.422546 env[1393]: time="2025-03-17T18:50:50.422193089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Mar 17 18:50:50.424535 env[1393]: time="2025-03-17T18:50:50.424503698Z" level=info msg="CreateContainer within sandbox \"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:50:50.463600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2097496986.mount: Deactivated successfully. Mar 17 18:50:50.475957 env[1393]: time="2025-03-17T18:50:50.475914290Z" level=info msg="CreateContainer within sandbox \"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"15b338447cca721f3b924ff8ea0309306b27138c998933be7bcfaa70db549292\"" Mar 17 18:50:50.477626 env[1393]: time="2025-03-17T18:50:50.477589196Z" level=info msg="StartContainer for \"15b338447cca721f3b924ff8ea0309306b27138c998933be7bcfaa70db549292\"" Mar 17 18:50:50.508538 systemd[1]: Started cri-containerd-15b338447cca721f3b924ff8ea0309306b27138c998933be7bcfaa70db549292.scope. Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1988e81c38 items=0 ppid=3850 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:50.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623333383434376363613732316633623932346666386561303330 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit: BPF prog-id=195 op=LOAD Mar 17 18:50:50.521000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000286238 items=0 ppid=3850 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:50.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623333383434376363613732316633623932346666386561303330 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit: BPF prog-id=196 op=LOAD Mar 17 18:50:50.521000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000286288 items=0 ppid=3850 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:50.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623333383434376363613732316633623932346666386561303330 Mar 17 18:50:50.521000 audit: BPF prog-id=196 op=UNLOAD Mar 17 18:50:50.521000 audit: BPF prog-id=195 op=UNLOAD Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { perfmon } for pid=4554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit[4554]: AVC avc: denied { bpf } for pid=4554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:50.521000 audit: BPF prog-id=197 op=LOAD Mar 17 18:50:50.521000 audit[4554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000286318 items=0 ppid=3850 pid=4554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:50.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135623333383434376363613732316633623932346666386561303330 Mar 17 18:50:50.540339 env[1393]: time="2025-03-17T18:50:50.540277830Z" level=info msg="StartContainer for \"15b338447cca721f3b924ff8ea0309306b27138c998933be7bcfaa70db549292\" returns successfully" Mar 17 18:50:50.646838 kubelet[2493]: I0317 18:50:50.646454 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:50:50.745000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:50.745000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:50.745000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e30aa0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:50.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:50.745000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00172f9e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:50.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:51.233000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.233000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.233000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00971d5f0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.233000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004a343c0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.236000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.236000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0095aec60 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.240000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.240000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0095aee10 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.277000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.277000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:51.277000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00971d980 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.277000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c004a34580 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:50:51.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:50:51.500470 kubelet[2493]: I0317 18:50:51.499988 2493 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:50:51.500470 kubelet[2493]: I0317 18:50:51.500048 2493 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:50:52.066692 kubelet[2493]: I0317 18:50:52.066390 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:50:52.096113 kubelet[2493]: I0317 18:50:52.096005 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-dnzzl" podStartSLOduration=28.499759856 podStartE2EDuration="35.095961695s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:43.825699749 +0000 UTC m=+47.559068761" lastFinishedPulling="2025-03-17 18:50:50.421901588 +0000 UTC m=+54.155270600" observedRunningTime="2025-03-17 18:50:50.659531676 +0000 UTC m=+54.392900688" watchObservedRunningTime="2025-03-17 18:50:52.095961695 +0000 UTC m=+55.829330707" Mar 17 18:50:52.122000 audit[4590]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:52.122000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd08d6ec00 a2=0 a3=7ffd08d6ebec items=0 ppid=2630 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:52.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:52.127000 audit[4590]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:52.127000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd08d6ec00 a2=0 a3=7ffd08d6ebec items=0 ppid=2630 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:52.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:53.082342 env[1393]: time="2025-03-17T18:50:53.082286398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.088942 env[1393]: time="2025-03-17T18:50:53.088900022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.092805 env[1393]: time="2025-03-17T18:50:53.092775436Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.098912 env[1393]: time="2025-03-17T18:50:53.098770457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.099527 env[1393]: time="2025-03-17T18:50:53.099495660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Mar 17 18:50:53.100894 env[1393]: time="2025-03-17T18:50:53.100869365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 18:50:53.120439 env[1393]: time="2025-03-17T18:50:53.120403935Z" level=info msg="CreateContainer within sandbox \"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Mar 17 18:50:53.152410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214501292.mount: Deactivated successfully. Mar 17 18:50:53.168148 env[1393]: time="2025-03-17T18:50:53.168112208Z" level=info msg="CreateContainer within sandbox \"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195\"" Mar 17 18:50:53.169851 env[1393]: time="2025-03-17T18:50:53.168728610Z" level=info msg="StartContainer for \"cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195\"" Mar 17 18:50:53.190807 systemd[1]: Started cri-containerd-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195.scope. Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.206000 audit: BPF prog-id=198 op=LOAD Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4128 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326631323839633764633332626230373534623639323031333832 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4128 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326631323839633764633332626230373534623639323031333832 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit: BPF prog-id=199 op=LOAD Mar 17 18:50:53.207000 audit[4601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fc930 items=0 ppid=4128 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326631323839633764633332626230373534623639323031333832 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit: BPF prog-id=200 op=LOAD Mar 17 18:50:53.207000 audit[4601]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fc978 items=0 ppid=4128 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326631323839633764633332626230373534623639323031333832 Mar 17 18:50:53.207000 audit: BPF prog-id=200 op=UNLOAD Mar 17 18:50:53.207000 audit: BPF prog-id=199 op=UNLOAD Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.207000 audit: BPF prog-id=201 op=LOAD Mar 17 18:50:53.207000 audit[4601]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001fcd88 items=0 ppid=4128 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363326631323839633764633332626230373534623639323031333832 Mar 17 18:50:53.241861 env[1393]: time="2025-03-17T18:50:53.241820775Z" level=info msg="StartContainer for \"cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195\" returns successfully" Mar 17 18:50:53.479232 env[1393]: time="2025-03-17T18:50:53.479118233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.488748 env[1393]: time="2025-03-17T18:50:53.488702668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.492632 env[1393]: time="2025-03-17T18:50:53.492590082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.496816 env[1393]: time="2025-03-17T18:50:53.496729397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:50:53.497445 env[1393]: time="2025-03-17T18:50:53.497412399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 18:50:53.500213 env[1393]: time="2025-03-17T18:50:53.500183409Z" level=info msg="CreateContainer within sandbox \"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 18:50:53.539227 env[1393]: time="2025-03-17T18:50:53.539189551Z" level=info msg="CreateContainer within sandbox \"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8221683cb8976700c1f246886dd11a9b10a7c527b029d3ad64c74c9cf8da1339\"" Mar 17 18:50:53.540354 env[1393]: time="2025-03-17T18:50:53.539708252Z" level=info msg="StartContainer for \"8221683cb8976700c1f246886dd11a9b10a7c527b029d3ad64c74c9cf8da1339\"" Mar 17 18:50:53.557695 systemd[1]: Started cri-containerd-8221683cb8976700c1f246886dd11a9b10a7c527b029d3ad64c74c9cf8da1339.scope. Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit: BPF prog-id=202 op=LOAD Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4471 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323136383363623839373637303063316632343638383664643131 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4471 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323136383363623839373637303063316632343638383664643131 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.573000 audit: BPF prog-id=203 op=LOAD Mar 17 18:50:53.573000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003bab60 items=0 ppid=4471 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323136383363623839373637303063316632343638383664643131 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit: BPF prog-id=204 op=LOAD Mar 17 18:50:53.574000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003baba8 items=0 ppid=4471 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323136383363623839373637303063316632343638383664643131 Mar 17 18:50:53.574000 audit: BPF prog-id=204 op=UNLOAD Mar 17 18:50:53.574000 audit: BPF prog-id=203 op=UNLOAD Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { perfmon } for pid=4638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit[4638]: AVC avc: denied { bpf } for pid=4638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:50:53.574000 audit: BPF prog-id=205 op=LOAD Mar 17 18:50:53.574000 audit[4638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003bafb8 items=0 ppid=4471 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323136383363623839373637303063316632343638383664643131 Mar 17 18:50:53.607301 env[1393]: time="2025-03-17T18:50:53.607247697Z" level=info msg="StartContainer for \"8221683cb8976700c1f246886dd11a9b10a7c527b029d3ad64c74c9cf8da1339\" returns successfully" Mar 17 18:50:53.708653 kubelet[2493]: I0317 18:50:53.708584 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6765df6b74-2rg6f" podStartSLOduration=31.360235744 podStartE2EDuration="36.708564163s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:48.150288185 +0000 UTC m=+51.883657297" lastFinishedPulling="2025-03-17 18:50:53.498616604 +0000 UTC m=+57.231985716" observedRunningTime="2025-03-17 18:50:53.673919838 +0000 UTC m=+57.407288950" watchObservedRunningTime="2025-03-17 18:50:53.708564163 +0000 UTC m=+57.441933175" Mar 17 18:50:53.718000 audit[4686]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:53.718000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff3fda0920 a2=0 a3=7fff3fda090c items=0 ppid=2630 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:53.722000 audit[4686]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:50:53.722000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff3fda0920 a2=0 a3=7fff3fda090c items=0 ppid=2630 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:50:53.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:50:53.766970 kubelet[2493]: I0317 18:50:53.766411 2493 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-57b4c557cd-z582z" podStartSLOduration=29.631484202 podStartE2EDuration="36.766380772s" podCreationTimestamp="2025-03-17 18:50:17 +0000 UTC" firstStartedPulling="2025-03-17 18:50:45.965760394 +0000 UTC m=+49.699129406" lastFinishedPulling="2025-03-17 18:50:53.100656964 +0000 UTC m=+56.834025976" observedRunningTime="2025-03-17 18:50:53.709836068 +0000 UTC m=+57.443205180" watchObservedRunningTime="2025-03-17 18:50:53.766380772 +0000 UTC m=+57.499749884" Mar 17 18:50:54.409000 audit[4649]: AVC avc: denied { watch } for pid=4649 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.500005495/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c721,c783 tclass=file permissive=0 Mar 17 18:50:54.414078 kernel: kauditd_printk_skb: 255 callbacks suppressed Mar 17 18:50:54.414186 kernel: audit: type=1400 audit(1742237454.409:1297): avc: denied { watch } for pid=4649 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.500005495/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c721,c783 tclass=file permissive=0 Mar 17 18:50:54.409000 audit[4649]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ca0020 a2=fc6 a3=0 items=0 ppid=4471 pid=4649 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 key=(null) Mar 17 18:50:54.449795 kernel: audit: type=1300 audit(1742237454.409:1297): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ca0020 a2=fc6 a3=0 items=0 ppid=4471 pid=4649 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 key=(null) Mar 17 18:50:54.449899 kernel: audit: type=1327 audit(1742237454.409:1297): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:50:54.409000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:50:54.661234 kubelet[2493]: I0317 18:50:54.661115 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:50:56.392290 env[1393]: time="2025-03-17T18:50:56.392245320Z" level=info msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.425 [WARNING][4704] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"f024ce9b-71cd-4457-9d10-6cdc40d182d1", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8", Pod:"calico-apiserver-6765df6b74-bp7cw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3469bcb083a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.425 [INFO][4704] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.425 [INFO][4704] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" iface="eth0" netns="" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.425 [INFO][4704] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.425 [INFO][4704] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.448 [INFO][4711] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.448 [INFO][4711] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.448 [INFO][4711] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.455 [WARNING][4711] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.455 [INFO][4711] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.459 [INFO][4711] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.462724 env[1393]: 2025-03-17 18:50:56.461 [INFO][4704] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.462724 env[1393]: time="2025-03-17T18:50:56.462674467Z" level=info msg="TearDown network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" successfully" Mar 17 18:50:56.462724 env[1393]: time="2025-03-17T18:50:56.462704967Z" level=info msg="StopPodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" returns successfully" Mar 17 18:50:56.463934 env[1393]: time="2025-03-17T18:50:56.463857271Z" level=info msg="RemovePodSandbox for \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" Mar 17 18:50:56.463934 env[1393]: time="2025-03-17T18:50:56.463896271Z" level=info msg="Forcibly stopping sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\"" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.515 [WARNING][4730] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"f024ce9b-71cd-4457-9d10-6cdc40d182d1", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"cd233af7580dc00db7304717a5fab730bcff6cd84a2ec0417e0088ced3dbc1b8", Pod:"calico-apiserver-6765df6b74-bp7cw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3469bcb083a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.515 [INFO][4730] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.515 [INFO][4730] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" iface="eth0" netns="" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.515 [INFO][4730] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.515 [INFO][4730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.538 [INFO][4736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.538 [INFO][4736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.539 [INFO][4736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.544 [WARNING][4736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.544 [INFO][4736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" HandleID="k8s-pod-network.42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--bp7cw-eth0" Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.545 [INFO][4736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.548435 env[1393]: 2025-03-17 18:50:56.547 [INFO][4730] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd" Mar 17 18:50:56.549297 env[1393]: time="2025-03-17T18:50:56.549250571Z" level=info msg="TearDown network for sandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" successfully" Mar 17 18:50:56.557595 env[1393]: time="2025-03-17T18:50:56.557551600Z" level=info msg="RemovePodSandbox \"42d86e38c76760accd7dea3332f2cef2efc7e5a138131437fa0509e397faeafd\" returns successfully" Mar 17 18:50:56.558401 env[1393]: time="2025-03-17T18:50:56.558365703Z" level=info msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.627 [WARNING][4757] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"247e8772-f8ae-45ef-b4a2-6a845e9d9c87", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9", Pod:"calico-apiserver-6765df6b74-2rg6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9150468dea9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.628 [INFO][4757] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.628 [INFO][4757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" iface="eth0" netns="" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.628 [INFO][4757] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.628 [INFO][4757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.663 [INFO][4765] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.663 [INFO][4765] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.663 [INFO][4765] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.672 [WARNING][4765] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.673 [INFO][4765] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.675 [INFO][4765] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.677525 env[1393]: 2025-03-17 18:50:56.676 [INFO][4757] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.678691 env[1393]: time="2025-03-17T18:50:56.678654825Z" level=info msg="TearDown network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" successfully" Mar 17 18:50:56.678844 env[1393]: time="2025-03-17T18:50:56.678796325Z" level=info msg="StopPodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" returns successfully" Mar 17 18:50:56.679332 env[1393]: time="2025-03-17T18:50:56.679294727Z" level=info msg="RemovePodSandbox for \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" Mar 17 18:50:56.679449 env[1393]: time="2025-03-17T18:50:56.679325827Z" level=info msg="Forcibly stopping sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\"" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.724 [WARNING][4786] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0", GenerateName:"calico-apiserver-6765df6b74-", Namespace:"calico-apiserver", SelfLink:"", UID:"247e8772-f8ae-45ef-b4a2-6a845e9d9c87", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6765df6b74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"fd98a3e20775f4de527dd4f658a9fd70ff138afc43ae9ddef4d4031eb49e12c9", Pod:"calico-apiserver-6765df6b74-2rg6f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9150468dea9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.724 [INFO][4786] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.724 [INFO][4786] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" iface="eth0" netns="" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.724 [INFO][4786] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.724 [INFO][4786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.757 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.757 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.757 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.766 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.766 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" HandleID="k8s-pod-network.10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--apiserver--6765df6b74--2rg6f-eth0" Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.768 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.769926 env[1393]: 2025-03-17 18:50:56.768 [INFO][4786] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243" Mar 17 18:50:56.770626 env[1393]: time="2025-03-17T18:50:56.769951245Z" level=info msg="TearDown network for sandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" successfully" Mar 17 18:50:56.779732 env[1393]: time="2025-03-17T18:50:56.779610879Z" level=info msg="RemovePodSandbox \"10899f3305a8447306e34cdbea2416f96b61c6f773cb1199903e10564b040243\" returns successfully" Mar 17 18:50:56.780278 env[1393]: time="2025-03-17T18:50:56.780249281Z" level=info msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.814 [WARNING][4812] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8d640bba-0229-4c6f-83a6-c6475a264dc8", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12", Pod:"coredns-7db6d8ff4d-fkltq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali16af64e1f5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.814 [INFO][4812] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.814 [INFO][4812] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" iface="eth0" netns="" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.815 [INFO][4812] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.815 [INFO][4812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.834 [INFO][4818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.834 [INFO][4818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.835 [INFO][4818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.840 [WARNING][4818] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.840 [INFO][4818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.841 [INFO][4818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.843756 env[1393]: 2025-03-17 18:50:56.842 [INFO][4812] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.844554 env[1393]: time="2025-03-17T18:50:56.843793204Z" level=info msg="TearDown network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" successfully" Mar 17 18:50:56.844554 env[1393]: time="2025-03-17T18:50:56.843834304Z" level=info msg="StopPodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" returns successfully" Mar 17 18:50:56.844851 env[1393]: time="2025-03-17T18:50:56.844818608Z" level=info msg="RemovePodSandbox for \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" Mar 17 18:50:56.844956 env[1393]: time="2025-03-17T18:50:56.844855708Z" level=info msg="Forcibly stopping sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\"" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.877 [WARNING][4837] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8d640bba-0229-4c6f-83a6-c6475a264dc8", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"a1c25c79b2661625daa6db53d55b782991949135d9a2634d03012fd7bd0a8a12", Pod:"coredns-7db6d8ff4d-fkltq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali16af64e1f5e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.877 [INFO][4837] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.877 [INFO][4837] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" iface="eth0" netns="" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.877 [INFO][4837] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.877 [INFO][4837] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.899 [INFO][4843] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.899 [INFO][4843] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.899 [INFO][4843] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.903 [WARNING][4843] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.903 [INFO][4843] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" HandleID="k8s-pod-network.0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--fkltq-eth0" Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.905 [INFO][4843] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.907144 env[1393]: 2025-03-17 18:50:56.906 [INFO][4837] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409" Mar 17 18:50:56.907846 env[1393]: time="2025-03-17T18:50:56.907180627Z" level=info msg="TearDown network for sandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" successfully" Mar 17 18:50:56.914032 env[1393]: time="2025-03-17T18:50:56.913977451Z" level=info msg="RemovePodSandbox \"0f5c0f15a30cb3040fb268929c490352d96035bb67f295fdcb23cb057faea409\" returns successfully" Mar 17 18:50:56.914646 env[1393]: time="2025-03-17T18:50:56.914610353Z" level=info msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.947 [WARNING][4861] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7d868b1-5177-4620-8f50-dbb00237cb1d", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb", Pod:"csi-node-driver-dnzzl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib2ed4fdd474", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.947 [INFO][4861] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.947 [INFO][4861] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" iface="eth0" netns="" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.947 [INFO][4861] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.947 [INFO][4861] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.966 [INFO][4867] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.966 [INFO][4867] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.967 [INFO][4867] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.973 [WARNING][4867] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.973 [INFO][4867] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.975 [INFO][4867] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:56.977168 env[1393]: 2025-03-17 18:50:56.976 [INFO][4861] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:56.979099 env[1393]: time="2025-03-17T18:50:56.977134972Z" level=info msg="TearDown network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" successfully" Mar 17 18:50:56.979197 env[1393]: time="2025-03-17T18:50:56.979100679Z" level=info msg="StopPodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" returns successfully" Mar 17 18:50:56.979661 env[1393]: time="2025-03-17T18:50:56.979625881Z" level=info msg="RemovePodSandbox for \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" Mar 17 18:50:56.979754 env[1393]: time="2025-03-17T18:50:56.979664681Z" level=info msg="Forcibly stopping sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\"" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.012 [WARNING][4886] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e7d868b1-5177-4620-8f50-dbb00237cb1d", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"17ca0e7a85b12be5b67d2d73544a1d5f9af841be2c4914ab5d7ccd4e31cc75eb", Pod:"csi-node-driver-dnzzl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib2ed4fdd474", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.012 [INFO][4886] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.012 [INFO][4886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" iface="eth0" netns="" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.012 [INFO][4886] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.012 [INFO][4886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.033 [INFO][4893] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.033 [INFO][4893] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.033 [INFO][4893] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.038 [WARNING][4893] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.038 [INFO][4893] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" HandleID="k8s-pod-network.d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Workload="ci--3510.3.7--a--1304b8c80d-k8s-csi--node--driver--dnzzl-eth0" Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.039 [INFO][4893] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:57.041607 env[1393]: 2025-03-17 18:50:57.040 [INFO][4886] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c" Mar 17 18:50:57.042307 env[1393]: time="2025-03-17T18:50:57.041659397Z" level=info msg="TearDown network for sandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" successfully" Mar 17 18:50:57.048439 env[1393]: time="2025-03-17T18:50:57.048396221Z" level=info msg="RemovePodSandbox \"d7d69b4c089b807332d3ffef31d50695b47aefbacc721f16b6da00e54746213c\" returns successfully" Mar 17 18:50:57.049010 env[1393]: time="2025-03-17T18:50:57.048957823Z" level=info msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.086 [WARNING][4911] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0", GenerateName:"calico-kube-controllers-57b4c557cd-", Namespace:"calico-system", SelfLink:"", UID:"8aa558d3-f357-4b87-9397-bc72517eb6b8", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b4c557cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950", Pod:"calico-kube-controllers-57b4c557cd-z582z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66d91e9063e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.087 [INFO][4911] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.087 [INFO][4911] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" iface="eth0" netns="" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.087 [INFO][4911] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.087 [INFO][4911] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.109 [INFO][4917] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.109 [INFO][4917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.110 [INFO][4917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.116 [WARNING][4917] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.116 [INFO][4917] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.117 [INFO][4917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:57.119584 env[1393]: 2025-03-17 18:50:57.118 [INFO][4911] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.120398 env[1393]: time="2025-03-17T18:50:57.119614968Z" level=info msg="TearDown network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" successfully" Mar 17 18:50:57.120398 env[1393]: time="2025-03-17T18:50:57.119657569Z" level=info msg="StopPodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" returns successfully" Mar 17 18:50:57.120398 env[1393]: time="2025-03-17T18:50:57.120162470Z" level=info msg="RemovePodSandbox for \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" Mar 17 18:50:57.120398 env[1393]: time="2025-03-17T18:50:57.120200470Z" level=info msg="Forcibly stopping sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\"" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.175 [WARNING][4936] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0", GenerateName:"calico-kube-controllers-57b4c557cd-", Namespace:"calico-system", SelfLink:"", UID:"8aa558d3-f357-4b87-9397-bc72517eb6b8", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b4c557cd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"4e816bb57cea497a713e7bdc5790770c093ee78a6f3d6a14e3e7f788d355d950", Pod:"calico-kube-controllers-57b4c557cd-z582z", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66d91e9063e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.175 [INFO][4936] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.175 [INFO][4936] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" iface="eth0" netns="" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.175 [INFO][4936] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.175 [INFO][4936] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.219 [INFO][4942] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.219 [INFO][4942] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.219 [INFO][4942] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.232 [WARNING][4942] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.232 [INFO][4942] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" HandleID="k8s-pod-network.fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Workload="ci--3510.3.7--a--1304b8c80d-k8s-calico--kube--controllers--57b4c557cd--z582z-eth0" Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.236 [INFO][4942] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:57.238748 env[1393]: 2025-03-17 18:50:57.237 [INFO][4936] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5" Mar 17 18:50:57.239655 env[1393]: time="2025-03-17T18:50:57.239613985Z" level=info msg="TearDown network for sandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" successfully" Mar 17 18:50:57.248340 env[1393]: time="2025-03-17T18:50:57.248300716Z" level=info msg="RemovePodSandbox \"fa3b02256d55b27d3a2ba7bc3193669c0012458008f537135adcffaf04035ef5\" returns successfully" Mar 17 18:50:57.249124 env[1393]: time="2025-03-17T18:50:57.249093818Z" level=info msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.318 [WARNING][4961] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"e1039987-282f-4b16-82a7-62cee169ff89", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94", Pod:"coredns-7db6d8ff4d-wvc6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8201dc162ce", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.318 [INFO][4961] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.318 [INFO][4961] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" iface="eth0" netns="" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.318 [INFO][4961] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.318 [INFO][4961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.357 [INFO][4967] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.357 [INFO][4967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.357 [INFO][4967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.364 [WARNING][4967] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.365 [INFO][4967] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.366 [INFO][4967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:57.369280 env[1393]: 2025-03-17 18:50:57.368 [INFO][4961] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.370119 env[1393]: time="2025-03-17T18:50:57.370077539Z" level=info msg="TearDown network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" successfully" Mar 17 18:50:57.370219 env[1393]: time="2025-03-17T18:50:57.370200839Z" level=info msg="StopPodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" returns successfully" Mar 17 18:50:57.370817 env[1393]: time="2025-03-17T18:50:57.370787641Z" level=info msg="RemovePodSandbox for \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" Mar 17 18:50:57.371040 env[1393]: time="2025-03-17T18:50:57.370969942Z" level=info msg="Forcibly stopping sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\"" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.405 [WARNING][4987] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"e1039987-282f-4b16-82a7-62cee169ff89", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 50, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-1304b8c80d", ContainerID:"0bdde2f83f6a492a67398014d1d25e1ca13d71803a409e70e4ef707e009a2f94", Pod:"coredns-7db6d8ff4d-wvc6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8201dc162ce", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.405 [INFO][4987] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.405 [INFO][4987] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" iface="eth0" netns="" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.405 [INFO][4987] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.405 [INFO][4987] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.425 [INFO][4993] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.426 [INFO][4993] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.426 [INFO][4993] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.430 [WARNING][4993] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.430 [INFO][4993] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" HandleID="k8s-pod-network.9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Workload="ci--3510.3.7--a--1304b8c80d-k8s-coredns--7db6d8ff4d--wvc6w-eth0" Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.432 [INFO][4993] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:50:57.433957 env[1393]: 2025-03-17 18:50:57.433 [INFO][4987] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360" Mar 17 18:50:57.434843 env[1393]: time="2025-03-17T18:50:57.434796264Z" level=info msg="TearDown network for sandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" successfully" Mar 17 18:50:57.447815 env[1393]: time="2025-03-17T18:50:57.447775809Z" level=info msg="RemovePodSandbox \"9784822bab8d38297387c83b96acbd6e3249acdfdc89defbbaaafcb76f8ea360\" returns successfully" Mar 17 18:50:58.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.869000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027a9d00 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.903967 kernel: audit: type=1400 audit(1742237458.869:1298): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.904100 kernel: audit: type=1300 audit(1742237458.869:1298): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027a9d00 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.904135 kernel: audit: type=1327 audit(1742237458.869:1298): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:58.869000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:58.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.936052 kernel: audit: type=1400 audit(1742237458.870:1299): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.936161 kernel: audit: type=1300 audit(1742237458.870:1299): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005f2fa0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.870000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005f2fa0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.870000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:58.972221 kernel: audit: type=1327 audit(1742237458.870:1299): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:58.972317 kernel: audit: type=1400 audit(1742237458.870:1300): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.870000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005f2fe0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.870000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:58.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:50:58.871000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0005f3020 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:50:58.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:50:59.358926 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.vVhnuy.mount: Deactivated successfully. Mar 17 18:51:04.660976 systemd[1]: run-containerd-runc-k8s.io-511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5-runc.6AZFgk.mount: Deactivated successfully. Mar 17 18:51:05.444715 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.FDrYwE.mount: Deactivated successfully. Mar 17 18:51:20.022168 kubelet[2493]: I0317 18:51:20.021792 2493 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 18:51:20.065000 audit[5078]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:51:20.070328 kernel: kauditd_printk_skb: 5 callbacks suppressed Mar 17 18:51:20.070444 kernel: audit: type=1325 audit(1742237480.065:1302): table=filter:124 family=2 entries=8 op=nft_register_rule pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:51:20.065000 audit[5078]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffbb11cf20 a2=0 a3=7fffbb11cf0c items=0 ppid=2630 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:20.099412 kernel: audit: type=1300 audit(1742237480.065:1302): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffbb11cf20 a2=0 a3=7fffbb11cf0c items=0 ppid=2630 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:20.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:51:20.109095 kernel: audit: type=1327 audit(1742237480.065:1302): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:51:20.109263 kernel: audit: type=1325 audit(1742237480.099:1303): table=nat:125 family=2 entries=34 op=nft_register_chain pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:51:20.099000 audit[5078]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=5078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:51:20.099000 audit[5078]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffbb11cf20 a2=0 a3=7fffbb11cf0c items=0 ppid=2630 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:20.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:51:20.146935 kernel: audit: type=1300 audit(1742237480.099:1303): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffbb11cf20 a2=0 a3=7fffbb11cf0c items=0 ppid=2630 pid=5078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:20.147104 kernel: audit: type=1327 audit(1742237480.099:1303): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:51:29.359855 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.1GFfAR.mount: Deactivated successfully. Mar 17 18:51:34.660531 systemd[1]: run-containerd-runc-k8s.io-511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5-runc.cUc7us.mount: Deactivated successfully. Mar 17 18:51:50.009000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.361776360/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c195 tclass=file permissive=0 Mar 17 18:51:50.029019 kernel: audit: type=1400 audit(1742237510.009:1304): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.361776360/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c195 tclass=file permissive=0 Mar 17 18:51:50.009000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011fe140 a2=fc6 a3=0 items=0 ppid=3949 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 key=(null) Mar 17 18:51:50.009000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:51:50.049029 kernel: audit: type=1300 audit(1742237510.009:1304): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011fe140 a2=fc6 a3=0 items=0 ppid=3949 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 key=(null) Mar 17 18:51:50.049095 kernel: audit: type=1327 audit(1742237510.009:1304): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:51:50.749000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:50.749000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:50.782287 kernel: audit: type=1400 audit(1742237510.749:1306): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:50.782419 kernel: audit: type=1400 audit(1742237510.749:1305): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:50.782446 kernel: audit: type=1300 audit(1742237510.749:1305): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001faf7e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:50.749000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001faf7e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:50.749000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:50.817719 kernel: audit: type=1327 audit(1742237510.749:1305): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:50.749000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023a0ff0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:50.749000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:50.839012 kernel: audit: type=1300 audit(1742237510.749:1306): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023a0ff0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:50.839081 kernel: audit: type=1327 audit(1742237510.749:1306): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:51.236000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.236000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.236000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0105c1b20 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:51.236000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c012165290 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:51.237000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.237000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0127ce2a0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:51.242000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.242000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0127ce390 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:51.254015 kernel: audit: type=1400 audit(1742237511.236:1308): avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.280000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.280000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:51.280000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0121652f0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.280000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0105c1e20 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:51:51.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:51.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:51:54.416000 audit[4649]: AVC avc: denied { watch } for pid=4649 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.500005495/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c721,c783 tclass=file permissive=0 Mar 17 18:51:54.416000 audit[4649]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020beb00 a2=fc6 a3=0 items=0 ppid=4471 pid=4649 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 key=(null) Mar 17 18:51:54.416000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:51:58.869000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.875254 kernel: kauditd_printk_skb: 20 callbacks suppressed Mar 17 18:51:58.875384 kernel: audit: type=1400 audit(1742237518.869:1314): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.869000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f37d40 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.910602 kernel: audit: type=1300 audit(1742237518.869:1314): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f37d40 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.910707 kernel: audit: type=1327 audit(1742237518.869:1314): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:58.869000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:58.938034 kernel: audit: type=1400 audit(1742237518.871:1315): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.871000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.871000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fafd20 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.942012 kernel: audit: type=1300 audit(1742237518.871:1315): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001fafd20 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:58.977425 kernel: audit: type=1327 audit(1742237518.871:1315): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:58.977502 kernel: audit: type=1400 audit(1742237518.872:1316): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.872000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.872000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f37d80 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.993014 kernel: audit: type=1300 audit(1742237518.872:1316): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f37d80 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.872000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:59.028689 kernel: audit: type=1327 audit(1742237518.872:1316): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:59.028784 kernel: audit: type=1400 audit(1742237518.872:1317): avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.872000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:51:58.872000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00201c180 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:51:58.872000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:51:59.358355 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.iGtny1.mount: Deactivated successfully. Mar 17 18:52:02.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.46:22-10.200.16.10:56378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:02.089313 systemd[1]: Started sshd@7-10.200.8.46:22-10.200.16.10:56378.service. Mar 17 18:52:02.724000 audit[5166]: USER_ACCT pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:02.726227 sshd[5166]: Accepted publickey for core from 10.200.16.10 port 56378 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:02.726000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:02.728030 sshd[5166]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:02.726000 audit[5166]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb2a30250 a2=3 a3=0 items=0 ppid=1 pid=5166 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:02.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:02.735064 systemd-logind[1381]: New session 10 of user core. Mar 17 18:52:02.735276 systemd[1]: Started session-10.scope. Mar 17 18:52:02.739000 audit[5166]: USER_START pid=5166 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:02.741000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:03.270102 sshd[5166]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:03.270000 audit[5166]: USER_END pid=5166 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:03.270000 audit[5166]: CRED_DISP pid=5166 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:03.273764 systemd[1]: sshd@7-10.200.8.46:22-10.200.16.10:56378.service: Deactivated successfully. Mar 17 18:52:03.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.46:22-10.200.16.10:56378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:03.274966 systemd[1]: session-10.scope: Deactivated successfully. Mar 17 18:52:03.275867 systemd-logind[1381]: Session 10 logged out. Waiting for processes to exit. Mar 17 18:52:03.276912 systemd-logind[1381]: Removed session 10. Mar 17 18:52:05.447386 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.Fl69id.mount: Deactivated successfully. Mar 17 18:52:08.376855 systemd[1]: Started sshd@8-10.200.8.46:22-10.200.16.10:56382.service. Mar 17 18:52:08.387425 kernel: kauditd_printk_skb: 13 callbacks suppressed Mar 17 18:52:08.387505 kernel: audit: type=1130 audit(1742237528.376:1327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.46:22-10.200.16.10:56382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:08.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.46:22-10.200.16.10:56382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:09.007000 audit[5226]: USER_ACCT pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.010123 sshd[5226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:09.027914 sshd[5226]: Accepted publickey for core from 10.200.16.10 port 56382 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:09.028119 kernel: audit: type=1101 audit(1742237529.007:1328): pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.007000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.033307 systemd[1]: Started session-11.scope. Mar 17 18:52:09.034337 systemd-logind[1381]: New session 11 of user core. Mar 17 18:52:09.045016 kernel: audit: type=1103 audit(1742237529.007:1329): pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.007000 audit[5226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6b32fc50 a2=3 a3=0 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:09.073835 kernel: audit: type=1006 audit(1742237529.007:1330): pid=5226 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Mar 17 18:52:09.073950 kernel: audit: type=1300 audit(1742237529.007:1330): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6b32fc50 a2=3 a3=0 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:09.073985 kernel: audit: type=1327 audit(1742237529.007:1330): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:09.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:09.037000 audit[5226]: USER_START pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.097338 kernel: audit: type=1105 audit(1742237529.037:1331): pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.042000 audit[5228]: CRED_ACQ pid=5228 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.112380 kernel: audit: type=1103 audit(1742237529.042:1332): pid=5228 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.507148 sshd[5226]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:09.507000 audit[5226]: USER_END pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.511590 systemd[1]: sshd@8-10.200.8.46:22-10.200.16.10:56382.service: Deactivated successfully. Mar 17 18:52:09.512525 systemd[1]: session-11.scope: Deactivated successfully. Mar 17 18:52:09.514679 systemd-logind[1381]: Session 11 logged out. Waiting for processes to exit. Mar 17 18:52:09.515985 systemd-logind[1381]: Removed session 11. Mar 17 18:52:09.508000 audit[5226]: CRED_DISP pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.542740 kernel: audit: type=1106 audit(1742237529.507:1333): pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.542824 kernel: audit: type=1104 audit(1742237529.508:1334): pid=5226 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:09.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.46:22-10.200.16.10:56382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:14.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.46:22-10.200.16.10:49920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:14.613030 systemd[1]: Started sshd@9-10.200.8.46:22-10.200.16.10:49920.service. Mar 17 18:52:14.618315 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:52:14.618402 kernel: audit: type=1130 audit(1742237534.612:1336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.46:22-10.200.16.10:49920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:15.240000 audit[5253]: USER_ACCT pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.243590 sshd[5253]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:15.260632 sshd[5253]: Accepted publickey for core from 10.200.16.10 port 49920 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:15.261027 kernel: audit: type=1101 audit(1742237535.240:1337): pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.242000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.266241 systemd[1]: Started session-12.scope. Mar 17 18:52:15.267388 systemd-logind[1381]: New session 12 of user core. Mar 17 18:52:15.288054 kernel: audit: type=1103 audit(1742237535.242:1338): pid=5253 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.288137 kernel: audit: type=1006 audit(1742237535.242:1339): pid=5253 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Mar 17 18:52:15.288157 kernel: audit: type=1300 audit(1742237535.242:1339): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe180c4080 a2=3 a3=0 items=0 ppid=1 pid=5253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:15.242000 audit[5253]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe180c4080 a2=3 a3=0 items=0 ppid=1 pid=5253 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:15.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:15.308918 kernel: audit: type=1327 audit(1742237535.242:1339): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:15.309017 kernel: audit: type=1105 audit(1742237535.272:1340): pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.272000 audit[5253]: USER_START pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.274000 audit[5255]: CRED_ACQ pid=5255 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.344023 kernel: audit: type=1103 audit(1742237535.274:1341): pid=5255 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.742550 sshd[5253]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:15.743000 audit[5253]: USER_END pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.747097 systemd-logind[1381]: Session 12 logged out. Waiting for processes to exit. Mar 17 18:52:15.748559 systemd[1]: sshd@9-10.200.8.46:22-10.200.16.10:49920.service: Deactivated successfully. Mar 17 18:52:15.749329 systemd[1]: session-12.scope: Deactivated successfully. Mar 17 18:52:15.751065 systemd-logind[1381]: Removed session 12. Mar 17 18:52:15.743000 audit[5253]: CRED_DISP pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.776437 kernel: audit: type=1106 audit(1742237535.743:1342): pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.776521 kernel: audit: type=1104 audit(1742237535.743:1343): pid=5253 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:15.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.46:22-10.200.16.10:49920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:15.848504 systemd[1]: Started sshd@10-10.200.8.46:22-10.200.16.10:49930.service. Mar 17 18:52:15.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.46:22-10.200.16.10:49930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:16.474000 audit[5265]: USER_ACCT pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:16.475879 sshd[5265]: Accepted publickey for core from 10.200.16.10 port 49930 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:16.475000 audit[5265]: CRED_ACQ pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:16.476000 audit[5265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90cfc9f0 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:16.476000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:16.477437 sshd[5265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:16.482622 systemd[1]: Started session-13.scope. Mar 17 18:52:16.483160 systemd-logind[1381]: New session 13 of user core. Mar 17 18:52:16.487000 audit[5265]: USER_START pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:16.489000 audit[5272]: CRED_ACQ pid=5272 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.029405 sshd[5265]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:17.030000 audit[5265]: USER_END pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.030000 audit[5265]: CRED_DISP pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.032912 systemd[1]: sshd@10-10.200.8.46:22-10.200.16.10:49930.service: Deactivated successfully. Mar 17 18:52:17.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.46:22-10.200.16.10:49930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:17.034113 systemd[1]: session-13.scope: Deactivated successfully. Mar 17 18:52:17.034929 systemd-logind[1381]: Session 13 logged out. Waiting for processes to exit. Mar 17 18:52:17.035890 systemd-logind[1381]: Removed session 13. Mar 17 18:52:17.134813 systemd[1]: Started sshd@11-10.200.8.46:22-10.200.16.10:49946.service. Mar 17 18:52:17.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.46:22-10.200.16.10:49946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:17.761000 audit[5279]: USER_ACCT pid=5279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.762468 sshd[5279]: Accepted publickey for core from 10.200.16.10 port 49946 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:17.762000 audit[5279]: CRED_ACQ pid=5279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.762000 audit[5279]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe38adbaf0 a2=3 a3=0 items=0 ppid=1 pid=5279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:17.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:17.763942 sshd[5279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:17.768890 systemd[1]: Started session-14.scope. Mar 17 18:52:17.769384 systemd-logind[1381]: New session 14 of user core. Mar 17 18:52:17.772000 audit[5279]: USER_START pid=5279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:17.774000 audit[5282]: CRED_ACQ pid=5282 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:18.269482 sshd[5279]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:18.269000 audit[5279]: USER_END pid=5279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:18.270000 audit[5279]: CRED_DISP pid=5279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:18.272672 systemd[1]: sshd@11-10.200.8.46:22-10.200.16.10:49946.service: Deactivated successfully. Mar 17 18:52:18.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.46:22-10.200.16.10:49946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:18.273622 systemd[1]: session-14.scope: Deactivated successfully. Mar 17 18:52:18.274348 systemd-logind[1381]: Session 14 logged out. Waiting for processes to exit. Mar 17 18:52:18.275149 systemd-logind[1381]: Removed session 14. Mar 17 18:52:23.395809 kernel: kauditd_printk_skb: 23 callbacks suppressed Mar 17 18:52:23.395952 kernel: audit: type=1130 audit(1742237543.374:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.46:22-10.200.16.10:42560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:23.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.46:22-10.200.16.10:42560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:23.375317 systemd[1]: Started sshd@12-10.200.8.46:22-10.200.16.10:42560.service. Mar 17 18:52:24.007000 audit[5292]: USER_ACCT pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.009219 sshd[5292]: Accepted publickey for core from 10.200.16.10 port 42560 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:24.027028 kernel: audit: type=1101 audit(1742237544.007:1364): pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.027130 kernel: audit: type=1103 audit(1742237544.026:1365): pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.026000 audit[5292]: CRED_ACQ pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.027640 sshd[5292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:24.037628 systemd[1]: Started session-15.scope. Mar 17 18:52:24.038231 systemd-logind[1381]: New session 15 of user core. Mar 17 18:52:24.045480 kernel: audit: type=1006 audit(1742237544.026:1366): pid=5292 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Mar 17 18:52:24.026000 audit[5292]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7748bd00 a2=3 a3=0 items=0 ppid=1 pid=5292 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:24.069970 kernel: audit: type=1300 audit(1742237544.026:1366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7748bd00 a2=3 a3=0 items=0 ppid=1 pid=5292 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:24.070093 kernel: audit: type=1327 audit(1742237544.026:1366): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:24.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:24.044000 audit[5292]: USER_START pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.046000 audit[5294]: CRED_ACQ pid=5294 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.107777 kernel: audit: type=1105 audit(1742237544.044:1367): pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.107886 kernel: audit: type=1103 audit(1742237544.046:1368): pid=5294 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.587098 sshd[5292]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:24.587000 audit[5292]: USER_END pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.590443 systemd[1]: sshd@12-10.200.8.46:22-10.200.16.10:42560.service: Deactivated successfully. Mar 17 18:52:24.591369 systemd[1]: session-15.scope: Deactivated successfully. Mar 17 18:52:24.593063 systemd-logind[1381]: Session 15 logged out. Waiting for processes to exit. Mar 17 18:52:24.593947 systemd-logind[1381]: Removed session 15. Mar 17 18:52:24.587000 audit[5292]: CRED_DISP pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.607017 kernel: audit: type=1106 audit(1742237544.587:1369): pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.607060 kernel: audit: type=1104 audit(1742237544.587:1370): pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:24.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.46:22-10.200.16.10:42560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:29.038727 update_engine[1382]: I0317 18:52:29.038674 1382 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Mar 17 18:52:29.038727 update_engine[1382]: I0317 18:52:29.038720 1382 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Mar 17 18:52:29.039406 update_engine[1382]: I0317 18:52:29.038908 1382 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Mar 17 18:52:29.039625 update_engine[1382]: I0317 18:52:29.039597 1382 omaha_request_params.cc:62] Current group set to lts Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039774 1382 update_attempter.cc:499] Already updated boot flags. Skipping. Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039790 1382 update_attempter.cc:643] Scheduling an action processor start. Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039812 1382 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039853 1382 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039933 1382 omaha_request_action.cc:270] Posting an Omaha request to disabled Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039942 1382 omaha_request_action.cc:271] Request: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: Mar 17 18:52:29.039942 update_engine[1382]: I0317 18:52:29.039947 1382 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Mar 17 18:52:29.040581 locksmithd[1471]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Mar 17 18:52:29.144697 update_engine[1382]: I0317 18:52:29.144649 1382 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Mar 17 18:52:29.145014 update_engine[1382]: I0317 18:52:29.144963 1382 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Mar 17 18:52:29.167841 update_engine[1382]: E0317 18:52:29.167802 1382 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Mar 17 18:52:29.167984 update_engine[1382]: I0317 18:52:29.167929 1382 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Mar 17 18:52:29.359430 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.8X9Eov.mount: Deactivated successfully. Mar 17 18:52:29.693734 systemd[1]: Started sshd@13-10.200.8.46:22-10.200.16.10:48788.service. Mar 17 18:52:29.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.46:22-10.200.16.10:48788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:29.716472 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:52:29.716596 kernel: audit: type=1130 audit(1742237549.692:1372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.46:22-10.200.16.10:48788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:30.323000 audit[5327]: USER_ACCT pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.326141 sshd[5327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:30.342424 kernel: audit: type=1101 audit(1742237550.323:1373): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.342499 sshd[5327]: Accepted publickey for core from 10.200.16.10 port 48788 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:30.324000 audit[5327]: CRED_ACQ pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.353761 systemd[1]: Started session-16.scope. Mar 17 18:52:30.355024 systemd-logind[1381]: New session 16 of user core. Mar 17 18:52:30.360704 kernel: audit: type=1103 audit(1742237550.324:1374): pid=5327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.324000 audit[5327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeea2bddb0 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:30.386299 kernel: audit: type=1006 audit(1742237550.324:1375): pid=5327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Mar 17 18:52:30.386388 kernel: audit: type=1300 audit(1742237550.324:1375): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeea2bddb0 a2=3 a3=0 items=0 ppid=1 pid=5327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:30.324000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:30.392053 kernel: audit: type=1327 audit(1742237550.324:1375): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:30.359000 audit[5327]: USER_START pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.366000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.426635 kernel: audit: type=1105 audit(1742237550.359:1376): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.426731 kernel: audit: type=1103 audit(1742237550.366:1377): pid=5329 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.831388 sshd[5327]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:30.832000 audit[5327]: USER_END pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.835917 systemd[1]: sshd@13-10.200.8.46:22-10.200.16.10:48788.service: Deactivated successfully. Mar 17 18:52:30.836840 systemd[1]: session-16.scope: Deactivated successfully. Mar 17 18:52:30.838404 systemd-logind[1381]: Session 16 logged out. Waiting for processes to exit. Mar 17 18:52:30.839406 systemd-logind[1381]: Removed session 16. Mar 17 18:52:30.832000 audit[5327]: CRED_DISP pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.864842 kernel: audit: type=1106 audit(1742237550.832:1378): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.864927 kernel: audit: type=1104 audit(1742237550.832:1379): pid=5327 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:30.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.46:22-10.200.16.10:48788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:34.659684 systemd[1]: run-containerd-runc-k8s.io-511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5-runc.XIf1YA.mount: Deactivated successfully. Mar 17 18:52:35.939710 systemd[1]: Started sshd@14-10.200.8.46:22-10.200.16.10:48792.service. Mar 17 18:52:35.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.46:22-10.200.16.10:48792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:35.945273 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:52:35.945351 kernel: audit: type=1130 audit(1742237555.939:1381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.46:22-10.200.16.10:48792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:36.569000 audit[5362]: USER_ACCT pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.570496 sshd[5362]: Accepted publickey for core from 10.200.16.10 port 48792 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:36.588020 kernel: audit: type=1101 audit(1742237556.569:1382): pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.587000 audit[5362]: CRED_ACQ pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.588892 sshd[5362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:36.594136 systemd[1]: Started session-17.scope. Mar 17 18:52:36.595310 systemd-logind[1381]: New session 17 of user core. Mar 17 18:52:36.606021 kernel: audit: type=1103 audit(1742237556.587:1383): pid=5362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.606103 kernel: audit: type=1006 audit(1742237556.587:1384): pid=5362 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Mar 17 18:52:36.587000 audit[5362]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeb659050 a2=3 a3=0 items=0 ppid=1 pid=5362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:36.629869 kernel: audit: type=1300 audit(1742237556.587:1384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeb659050 a2=3 a3=0 items=0 ppid=1 pid=5362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:36.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:36.599000 audit[5362]: USER_START pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.652546 kernel: audit: type=1327 audit(1742237556.587:1384): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:36.652821 kernel: audit: type=1105 audit(1742237556.599:1385): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.652868 kernel: audit: type=1103 audit(1742237556.602:1386): pid=5364 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:36.602000 audit[5364]: CRED_ACQ pid=5364 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.112779 sshd[5362]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:37.113000 audit[5362]: USER_END pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.116156 systemd[1]: sshd@14-10.200.8.46:22-10.200.16.10:48792.service: Deactivated successfully. Mar 17 18:52:37.117112 systemd[1]: session-17.scope: Deactivated successfully. Mar 17 18:52:37.120052 systemd-logind[1381]: Session 17 logged out. Waiting for processes to exit. Mar 17 18:52:37.121276 systemd-logind[1381]: Removed session 17. Mar 17 18:52:37.113000 audit[5362]: CRED_DISP pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.147383 kernel: audit: type=1106 audit(1742237557.113:1387): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.147486 kernel: audit: type=1104 audit(1742237557.113:1388): pid=5362 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.46:22-10.200.16.10:48792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:37.218870 systemd[1]: Started sshd@15-10.200.8.46:22-10.200.16.10:48798.service. Mar 17 18:52:37.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.46:22-10.200.16.10:48798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:37.844000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.845990 sshd[5373]: Accepted publickey for core from 10.200.16.10 port 48798 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:37.846000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.846000 audit[5373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96b644d0 a2=3 a3=0 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:37.846000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:37.847680 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:37.852878 systemd[1]: Started session-18.scope. Mar 17 18:52:37.853393 systemd-logind[1381]: New session 18 of user core. Mar 17 18:52:37.857000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:37.858000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:38.440270 sshd[5373]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:38.441000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:38.441000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:38.443675 systemd[1]: sshd@15-10.200.8.46:22-10.200.16.10:48798.service: Deactivated successfully. Mar 17 18:52:38.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.46:22-10.200.16.10:48798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:38.444595 systemd[1]: session-18.scope: Deactivated successfully. Mar 17 18:52:38.445319 systemd-logind[1381]: Session 18 logged out. Waiting for processes to exit. Mar 17 18:52:38.446101 systemd-logind[1381]: Removed session 18. Mar 17 18:52:38.547851 systemd[1]: Started sshd@16-10.200.8.46:22-10.200.16.10:34544.service. Mar 17 18:52:38.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.46:22-10.200.16.10:34544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:39.035451 update_engine[1382]: I0317 18:52:39.035358 1382 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Mar 17 18:52:39.035984 update_engine[1382]: I0317 18:52:39.035710 1382 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Mar 17 18:52:39.036108 update_engine[1382]: I0317 18:52:39.035989 1382 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Mar 17 18:52:39.053877 update_engine[1382]: E0317 18:52:39.053841 1382 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Mar 17 18:52:39.054042 update_engine[1382]: I0317 18:52:39.053961 1382 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Mar 17 18:52:39.173000 audit[5382]: USER_ACCT pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:39.174341 sshd[5382]: Accepted publickey for core from 10.200.16.10 port 34544 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:39.174000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:39.174000 audit[5382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03207ef0 a2=3 a3=0 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:39.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:39.176891 sshd[5382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:39.182033 systemd[1]: Started session-19.scope. Mar 17 18:52:39.182257 systemd-logind[1381]: New session 19 of user core. Mar 17 18:52:39.187000 audit[5382]: USER_START pid=5382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:39.189000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:41.447290 kernel: kauditd_printk_skb: 20 callbacks suppressed Mar 17 18:52:41.447599 kernel: audit: type=1325 audit(1742237561.429:1405): table=filter:126 family=2 entries=20 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.429000 audit[5398]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.459671 sshd[5382]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:41.460000 audit[5382]: USER_END pid=5382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:41.463623 systemd-logind[1381]: Session 19 logged out. Waiting for processes to exit. Mar 17 18:52:41.464839 systemd[1]: sshd@16-10.200.8.46:22-10.200.16.10:34544.service: Deactivated successfully. Mar 17 18:52:41.465586 systemd[1]: session-19.scope: Deactivated successfully. Mar 17 18:52:41.466819 systemd-logind[1381]: Removed session 19. Mar 17 18:52:41.483572 kernel: audit: type=1106 audit(1742237561.460:1406): pid=5382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:41.461000 audit[5382]: CRED_DISP pid=5382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:41.507022 kernel: audit: type=1104 audit(1742237561.461:1407): pid=5382 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:41.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.46:22-10.200.16.10:34544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:41.429000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff9f30bd10 a2=0 a3=7fff9f30bcfc items=0 ppid=2630 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.543019 kernel: audit: type=1131 audit(1742237561.464:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.46:22-10.200.16.10:34544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:41.543196 kernel: audit: type=1300 audit(1742237561.429:1405): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff9f30bd10 a2=0 a3=7fff9f30bcfc items=0 ppid=2630 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.543243 kernel: audit: type=1327 audit(1742237561.429:1405): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:41.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:41.491000 audit[5398]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.566017 kernel: audit: type=1325 audit(1742237561.491:1409): table=nat:127 family=2 entries=22 op=nft_register_rule pid=5398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.491000 audit[5398]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff9f30bd10 a2=0 a3=0 items=0 ppid=2630 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.587018 kernel: audit: type=1300 audit(1742237561.491:1409): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff9f30bd10 a2=0 a3=0 items=0 ppid=2630 pid=5398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.592085 systemd[1]: Started sshd@17-10.200.8.46:22-10.200.16.10:34558.service. Mar 17 18:52:41.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:41.571000 audit[5403]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=5403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.620054 kernel: audit: type=1327 audit(1742237561.491:1409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:41.620140 kernel: audit: type=1325 audit(1742237561.571:1410): table=filter:128 family=2 entries=32 op=nft_register_rule pid=5403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.571000 audit[5403]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe2710c650 a2=0 a3=7ffe2710c63c items=0 ppid=2630 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:41.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.46:22-10.200.16.10:34558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:41.615000 audit[5403]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:41.615000 audit[5403]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2710c650 a2=0 a3=0 items=0 ppid=2630 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:41.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:42.226000 audit[5404]: USER_ACCT pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.227434 sshd[5404]: Accepted publickey for core from 10.200.16.10 port 34558 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:42.227000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.227000 audit[5404]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a883740 a2=3 a3=0 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:42.227000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:42.229183 sshd[5404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:42.234664 systemd[1]: Started session-20.scope. Mar 17 18:52:42.235215 systemd-logind[1381]: New session 20 of user core. Mar 17 18:52:42.239000 audit[5404]: USER_START pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.240000 audit[5406]: CRED_ACQ pid=5406 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.839513 sshd[5404]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:42.840000 audit[5404]: USER_END pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.840000 audit[5404]: CRED_DISP pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:42.843074 systemd[1]: sshd@17-10.200.8.46:22-10.200.16.10:34558.service: Deactivated successfully. Mar 17 18:52:42.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.46:22-10.200.16.10:34558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:42.844260 systemd[1]: session-20.scope: Deactivated successfully. Mar 17 18:52:42.845135 systemd-logind[1381]: Session 20 logged out. Waiting for processes to exit. Mar 17 18:52:42.846080 systemd-logind[1381]: Removed session 20. Mar 17 18:52:42.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.46:22-10.200.16.10:34564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:42.944287 systemd[1]: Started sshd@18-10.200.8.46:22-10.200.16.10:34564.service. Mar 17 18:52:43.568000 audit[5414]: USER_ACCT pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.569688 sshd[5414]: Accepted publickey for core from 10.200.16.10 port 34564 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:43.569000 audit[5414]: CRED_ACQ pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.569000 audit[5414]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa7a79d0 a2=3 a3=0 items=0 ppid=1 pid=5414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:43.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:43.571182 sshd[5414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:43.576050 systemd-logind[1381]: New session 21 of user core. Mar 17 18:52:43.576149 systemd[1]: Started session-21.scope. Mar 17 18:52:43.580000 audit[5414]: USER_START pid=5414 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.581000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.067498 sshd[5414]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:44.068000 audit[5414]: USER_END pid=5414 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.068000 audit[5414]: CRED_DISP pid=5414 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.072579 systemd-logind[1381]: Session 21 logged out. Waiting for processes to exit. Mar 17 18:52:44.073074 systemd[1]: sshd@18-10.200.8.46:22-10.200.16.10:34564.service: Deactivated successfully. Mar 17 18:52:44.074037 systemd[1]: session-21.scope: Deactivated successfully. Mar 17 18:52:44.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.46:22-10.200.16.10:34564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:44.075538 systemd-logind[1381]: Removed session 21. Mar 17 18:52:49.039445 update_engine[1382]: I0317 18:52:49.039390 1382 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Mar 17 18:52:49.040044 update_engine[1382]: I0317 18:52:49.039724 1382 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Mar 17 18:52:49.040136 update_engine[1382]: I0317 18:52:49.040055 1382 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Mar 17 18:52:49.063592 update_engine[1382]: E0317 18:52:49.063546 1382 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Mar 17 18:52:49.063777 update_engine[1382]: I0317 18:52:49.063694 1382 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Mar 17 18:52:49.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.46:22-10.200.16.10:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:49.174861 systemd[1]: Started sshd@19-10.200.8.46:22-10.200.16.10:60786.service. Mar 17 18:52:49.197126 kernel: kauditd_printk_skb: 27 callbacks suppressed Mar 17 18:52:49.197257 kernel: audit: type=1130 audit(1742237569.174:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.46:22-10.200.16.10:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:49.803000 audit[5426]: USER_ACCT pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.822712 sshd[5426]: Accepted publickey for core from 10.200.16.10 port 60786 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:49.823100 kernel: audit: type=1101 audit(1742237569.803:1431): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.823144 sshd[5426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:49.821000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.828747 systemd[1]: Started session-22.scope. Mar 17 18:52:49.829915 systemd-logind[1381]: New session 22 of user core. Mar 17 18:52:49.849419 kernel: audit: type=1103 audit(1742237569.821:1432): pid=5426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.849499 kernel: audit: type=1006 audit(1742237569.821:1433): pid=5426 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Mar 17 18:52:49.849525 kernel: audit: type=1300 audit(1742237569.821:1433): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3c3050e0 a2=3 a3=0 items=0 ppid=1 pid=5426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:49.821000 audit[5426]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3c3050e0 a2=3 a3=0 items=0 ppid=1 pid=5426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:49.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:49.871407 kernel: audit: type=1327 audit(1742237569.821:1433): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:49.834000 audit[5426]: USER_START pid=5426 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.836000 audit[5428]: CRED_ACQ pid=5428 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.904565 kernel: audit: type=1105 audit(1742237569.834:1434): pid=5426 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:49.904656 kernel: audit: type=1103 audit(1742237569.836:1435): pid=5428 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:50.011000 audit[4527]: AVC avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.361776360/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c195 tclass=file permissive=0 Mar 17 18:52:50.029044 kernel: audit: type=1400 audit(1742237570.011:1436): avc: denied { watch } for pid=4527 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.361776360/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c123,c195 tclass=file permissive=0 Mar 17 18:52:50.011000 audit[4527]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011fefe0 a2=fc6 a3=0 items=0 ppid=3949 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 key=(null) Mar 17 18:52:50.011000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:52:50.050024 kernel: audit: type=1300 audit(1742237570.011:1436): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0011fefe0 a2=fc6 a3=0 items=0 ppid=3949 pid=4527 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c123,c195 key=(null) Mar 17 18:52:50.317679 sshd[5426]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:50.318000 audit[5426]: USER_END pid=5426 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:50.318000 audit[5426]: CRED_DISP pid=5426 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:50.321236 systemd[1]: sshd@19-10.200.8.46:22-10.200.16.10:60786.service: Deactivated successfully. Mar 17 18:52:50.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.46:22-10.200.16.10:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:50.322221 systemd[1]: session-22.scope: Deactivated successfully. Mar 17 18:52:50.322945 systemd-logind[1381]: Session 22 logged out. Waiting for processes to exit. Mar 17 18:52:50.323784 systemd-logind[1381]: Removed session 22. Mar 17 18:52:50.750000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:50.750000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:50.750000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027a8900 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:50.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:50.750000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f6cd50 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:50.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:51.236000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.236000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.236000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a2fd2c0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.236000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0076f2ce0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.237000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.237000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a7244e0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.242000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.242000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a2fd800 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.242000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.280000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.280000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00981c5a0 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.280000 audit[2312]: AVC avc: denied { watch } for pid=2312 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8297 scontext=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:51.280000 audit[2312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00a724720 a2=fc6 a3=0 items=0 ppid=2177 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c44,c864 key=(null) Mar 17 18:52:51.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 18:52:51.838000 audit[5439]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:51.838000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcebca8480 a2=0 a3=7ffcebca846c items=0 ppid=2630 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:51.843000 audit[5439]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:51.843000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcebca8480 a2=0 a3=7ffcebca846c items=0 ppid=2630 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:54.419000 audit[4649]: AVC avc: denied { watch } for pid=4649 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.500005495/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c721,c783 tclass=file permissive=0 Mar 17 18:52:54.424689 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 18:52:54.424784 kernel: audit: type=1400 audit(1742237574.419:1450): avc: denied { watch } for pid=4649 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_18_50_29.500005495/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c721,c783 tclass=file permissive=0 Mar 17 18:52:54.419000 audit[4649]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020bf940 a2=fc6 a3=0 items=0 ppid=4471 pid=4649 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 key=(null) Mar 17 18:52:54.419000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:52:54.476952 kernel: audit: type=1300 audit(1742237574.419:1450): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020bf940 a2=fc6 a3=0 items=0 ppid=4471 pid=4649 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c721,c783 key=(null) Mar 17 18:52:54.477096 kernel: audit: type=1327 audit(1742237574.419:1450): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 18:52:55.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.46:22-10.200.16.10:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:55.432344 systemd[1]: Started sshd@20-10.200.8.46:22-10.200.16.10:60792.service. Mar 17 18:52:55.450047 kernel: audit: type=1130 audit(1742237575.431:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.46:22-10.200.16.10:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:56.065000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.067934 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:56.084181 kernel: audit: type=1101 audit(1742237576.065:1452): pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.084229 sshd[5442]: Accepted publickey for core from 10.200.16.10 port 60792 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:52:56.066000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.094092 systemd-logind[1381]: New session 23 of user core. Mar 17 18:52:56.103362 systemd[1]: Started session-23.scope. Mar 17 18:52:56.111618 kernel: audit: type=1103 audit(1742237576.066:1453): pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.111703 kernel: audit: type=1006 audit(1742237576.066:1454): pid=5442 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Mar 17 18:52:56.114011 kernel: audit: type=1300 audit(1742237576.066:1454): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a978e70 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:56.066000 audit[5442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1a978e70 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:56.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:56.134308 kernel: audit: type=1327 audit(1742237576.066:1454): proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:56.134381 kernel: audit: type=1105 audit(1742237576.111:1455): pid=5442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.111000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.111000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.562000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.562000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:56.561903 sshd[5442]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:56.564781 systemd[1]: sshd@20-10.200.8.46:22-10.200.16.10:60792.service: Deactivated successfully. Mar 17 18:52:56.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.46:22-10.200.16.10:60792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:56.565806 systemd[1]: session-23.scope: Deactivated successfully. Mar 17 18:52:56.566517 systemd-logind[1381]: Session 23 logged out. Waiting for processes to exit. Mar 17 18:52:56.567387 systemd-logind[1381]: Removed session 23. Mar 17 18:52:58.870000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:58.870000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00100da80 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:58.870000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:58.873000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:58.873000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:58.873000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b7fc20 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:58.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:58.873000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00100daa0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:58.874000 audit[2341]: AVC avc: denied { watch } for pid=2341 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 18:52:58.874000 audit[2341]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b7fde0 a2=fc6 a3=0 items=0 ppid=2205 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c281,c329 key=(null) Mar 17 18:52:58.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:58.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 18:52:59.037180 update_engine[1382]: I0317 18:52:59.037125 1382 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Mar 17 18:52:59.037699 update_engine[1382]: I0317 18:52:59.037464 1382 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Mar 17 18:52:59.037770 update_engine[1382]: I0317 18:52:59.037755 1382 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Mar 17 18:52:59.102290 update_engine[1382]: E0317 18:52:59.102241 1382 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Mar 17 18:52:59.102522 update_engine[1382]: I0317 18:52:59.102391 1382 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Mar 17 18:52:59.102522 update_engine[1382]: I0317 18:52:59.102406 1382 omaha_request_action.cc:621] Omaha request response: Mar 17 18:52:59.102522 update_engine[1382]: E0317 18:52:59.102504 1382 omaha_request_action.cc:640] Omaha request network transfer failed. Mar 17 18:52:59.102522 update_engine[1382]: I0317 18:52:59.102520 1382 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102526 1382 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102531 1382 update_attempter.cc:306] Processing Done. Mar 17 18:52:59.102739 update_engine[1382]: E0317 18:52:59.102550 1382 update_attempter.cc:619] Update failed. Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102555 1382 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102561 1382 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102568 1382 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102670 1382 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102698 1382 omaha_request_action.cc:270] Posting an Omaha request to disabled Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102705 1382 omaha_request_action.cc:271] Request: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: Mar 17 18:52:59.102739 update_engine[1382]: I0317 18:52:59.102712 1382 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Mar 17 18:52:59.103527 update_engine[1382]: I0317 18:52:59.102934 1382 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Mar 17 18:52:59.103527 update_engine[1382]: I0317 18:52:59.103201 1382 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Mar 17 18:52:59.103695 locksmithd[1471]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Mar 17 18:52:59.124355 update_engine[1382]: E0317 18:52:59.124162 1382 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124415 1382 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124446 1382 omaha_request_action.cc:621] Omaha request response: Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124465 1382 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124478 1382 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124492 1382 update_attempter.cc:306] Processing Done. Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124509 1382 update_attempter.cc:310] Error event sent. Mar 17 18:52:59.124627 update_engine[1382]: I0317 18:52:59.124532 1382 update_check_scheduler.cc:74] Next update check in 41m22s Mar 17 18:52:59.125269 locksmithd[1471]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Mar 17 18:53:01.668736 systemd[1]: Started sshd@21-10.200.8.46:22-10.200.16.10:34712.service. Mar 17 18:53:01.690034 kernel: kauditd_printk_skb: 16 callbacks suppressed Mar 17 18:53:01.690095 kernel: audit: type=1130 audit(1742237581.668:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.46:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:01.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.46:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:02.294000 audit[5474]: USER_ACCT pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.297442 sshd[5474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:53:02.315096 kernel: audit: type=1101 audit(1742237582.294:1465): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.315147 sshd[5474]: Accepted publickey for core from 10.200.16.10 port 34712 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:53:02.296000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.319501 systemd[1]: Started session-24.scope. Mar 17 18:53:02.320509 systemd-logind[1381]: New session 24 of user core. Mar 17 18:53:02.340740 kernel: audit: type=1103 audit(1742237582.296:1466): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.340836 kernel: audit: type=1006 audit(1742237582.296:1467): pid=5474 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Mar 17 18:53:02.340872 kernel: audit: type=1300 audit(1742237582.296:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda7fd610 a2=3 a3=0 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:02.296000 audit[5474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda7fd610 a2=3 a3=0 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:02.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:02.362774 kernel: audit: type=1327 audit(1742237582.296:1467): proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:02.325000 audit[5474]: USER_START pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.327000 audit[5476]: CRED_ACQ pid=5476 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.395505 kernel: audit: type=1105 audit(1742237582.325:1468): pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.395589 kernel: audit: type=1103 audit(1742237582.327:1469): pid=5476 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.796724 sshd[5474]: pam_unix(sshd:session): session closed for user core Mar 17 18:53:02.797000 audit[5474]: USER_END pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.800543 systemd[1]: sshd@21-10.200.8.46:22-10.200.16.10:34712.service: Deactivated successfully. Mar 17 18:53:02.801476 systemd[1]: session-24.scope: Deactivated successfully. Mar 17 18:53:02.803425 systemd-logind[1381]: Session 24 logged out. Waiting for processes to exit. Mar 17 18:53:02.804570 systemd-logind[1381]: Removed session 24. Mar 17 18:53:02.797000 audit[5474]: CRED_DISP pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.817013 kernel: audit: type=1106 audit(1742237582.797:1470): pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.817060 kernel: audit: type=1104 audit(1742237582.797:1471): pid=5474 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:02.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.46:22-10.200.16.10:34712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:04.661230 systemd[1]: run-containerd-runc-k8s.io-511c8406beb42e1bb326c6cfd3572fd298e0db53a9dafdc5a023b11fee20b4b5-runc.45R20f.mount: Deactivated successfully. Mar 17 18:53:05.649609 systemd[1]: run-containerd-runc-k8s.io-cc2f1289c7dc32bb0754b69201382a3399eb58311f93ef0ba30daf238a4e2195-runc.9rijMn.mount: Deactivated successfully. Mar 17 18:53:07.925013 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:53:07.925169 kernel: audit: type=1130 audit(1742237587.902:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.46:22-10.200.16.10:34724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:07.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.46:22-10.200.16.10:34724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:07.902811 systemd[1]: Started sshd@22-10.200.8.46:22-10.200.16.10:34724.service. Mar 17 18:53:08.530000 audit[5527]: USER_ACCT pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.549711 sshd[5527]: Accepted publickey for core from 10.200.16.10 port 34724 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:53:08.550065 kernel: audit: type=1101 audit(1742237588.530:1474): pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.550150 sshd[5527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:53:08.549000 audit[5527]: CRED_ACQ pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.555384 systemd[1]: Started session-25.scope. Mar 17 18:53:08.556561 systemd-logind[1381]: New session 25 of user core. Mar 17 18:53:08.568018 kernel: audit: type=1103 audit(1742237588.549:1475): pid=5527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.568103 kernel: audit: type=1006 audit(1742237588.549:1476): pid=5527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Mar 17 18:53:08.549000 audit[5527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6b5bdb0 a2=3 a3=0 items=0 ppid=1 pid=5527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:08.576017 kernel: audit: type=1300 audit(1742237588.549:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff6b5bdb0 a2=3 a3=0 items=0 ppid=1 pid=5527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:08.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:08.560000 audit[5527]: USER_START pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.614556 kernel: audit: type=1327 audit(1742237588.549:1476): proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:08.614632 kernel: audit: type=1105 audit(1742237588.560:1477): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.614671 kernel: audit: type=1103 audit(1742237588.560:1478): pid=5529 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:08.560000 audit[5529]: CRED_ACQ pid=5529 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:09.035619 sshd[5527]: pam_unix(sshd:session): session closed for user core Mar 17 18:53:09.036000 audit[5527]: USER_END pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:09.039214 systemd[1]: sshd@22-10.200.8.46:22-10.200.16.10:34724.service: Deactivated successfully. Mar 17 18:53:09.039962 systemd[1]: session-25.scope: Deactivated successfully. Mar 17 18:53:09.047688 systemd-logind[1381]: Session 25 logged out. Waiting for processes to exit. Mar 17 18:53:09.048621 systemd-logind[1381]: Removed session 25. Mar 17 18:53:09.036000 audit[5527]: CRED_DISP pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:09.057102 kernel: audit: type=1106 audit(1742237589.036:1479): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:09.057137 kernel: audit: type=1104 audit(1742237589.036:1480): pid=5527 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:09.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.46:22-10.200.16.10:34724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:14.140245 systemd[1]: Started sshd@23-10.200.8.46:22-10.200.16.10:53190.service. Mar 17 18:53:14.149028 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:53:14.149102 kernel: audit: type=1130 audit(1742237594.139:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.46:22-10.200.16.10:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:14.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.46:22-10.200.16.10:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:14.768000 audit[5542]: USER_ACCT pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.770161 sshd[5542]: Accepted publickey for core from 10.200.16.10 port 53190 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:53:14.786000 audit[5542]: CRED_ACQ pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.788393 sshd[5542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:53:14.793705 systemd[1]: Started session-26.scope. Mar 17 18:53:14.794875 systemd-logind[1381]: New session 26 of user core. Mar 17 18:53:14.804791 kernel: audit: type=1101 audit(1742237594.768:1483): pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.804875 kernel: audit: type=1103 audit(1742237594.786:1484): pid=5542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.817029 kernel: audit: type=1006 audit(1742237594.787:1485): pid=5542 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Mar 17 18:53:14.817115 kernel: audit: type=1300 audit(1742237594.787:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc995620 a2=3 a3=0 items=0 ppid=1 pid=5542 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.787000 audit[5542]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc995620 a2=3 a3=0 items=0 ppid=1 pid=5542 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:14.833069 kernel: audit: type=1327 audit(1742237594.787:1485): proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:14.838089 kernel: audit: type=1105 audit(1742237594.799:1486): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.799000 audit[5542]: USER_START pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.807000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:14.855090 kernel: audit: type=1103 audit(1742237594.807:1487): pid=5544 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:15.270463 sshd[5542]: pam_unix(sshd:session): session closed for user core Mar 17 18:53:15.270000 audit[5542]: USER_END pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:15.273609 systemd-logind[1381]: Session 26 logged out. Waiting for processes to exit. Mar 17 18:53:15.274959 systemd[1]: sshd@23-10.200.8.46:22-10.200.16.10:53190.service: Deactivated successfully. Mar 17 18:53:15.275774 systemd[1]: session-26.scope: Deactivated successfully. Mar 17 18:53:15.277104 systemd-logind[1381]: Removed session 26. Mar 17 18:53:15.271000 audit[5542]: CRED_DISP pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:15.303814 kernel: audit: type=1106 audit(1742237595.270:1488): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:15.303914 kernel: audit: type=1104 audit(1742237595.271:1489): pid=5542 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:15.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.46:22-10.200.16.10:53190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:20.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.46:22-10.200.16.10:55122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:20.398113 systemd[1]: Started sshd@24-10.200.8.46:22-10.200.16.10:55122.service. Mar 17 18:53:20.403164 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 18:53:20.403253 kernel: audit: type=1130 audit(1742237600.397:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.46:22-10.200.16.10:55122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:53:21.024000 audit[5556]: USER_ACCT pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.045373 sshd[5556]: Accepted publickey for core from 10.200.16.10 port 55122 ssh2: RSA SHA256:Id7fTtJmja0nOLdf0IQA3jnxxJrUKKdGU1UW83zjTQg Mar 17 18:53:21.045689 sshd[5556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:53:21.046014 kernel: audit: type=1101 audit(1742237601.024:1492): pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.044000 audit[5556]: CRED_ACQ pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.051183 systemd[1]: Started session-27.scope. Mar 17 18:53:21.052036 systemd-logind[1381]: New session 27 of user core. Mar 17 18:53:21.064022 kernel: audit: type=1103 audit(1742237601.044:1493): pid=5556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.064116 kernel: audit: type=1006 audit(1742237601.044:1494): pid=5556 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Mar 17 18:53:21.044000 audit[5556]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7cdc7980 a2=3 a3=0 items=0 ppid=1 pid=5556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.090096 kernel: audit: type=1300 audit(1742237601.044:1494): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7cdc7980 a2=3 a3=0 items=0 ppid=1 pid=5556 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:21.095559 kernel: audit: type=1327 audit(1742237601.044:1494): proctitle=737368643A20636F7265205B707269765D Mar 17 18:53:21.095663 kernel: audit: type=1105 audit(1742237601.056:1495): pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.056000 audit[5556]: USER_START pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.056000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.127117 kernel: audit: type=1103 audit(1742237601.056:1496): pid=5559 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.531302 sshd[5556]: pam_unix(sshd:session): session closed for user core Mar 17 18:53:21.531000 audit[5556]: USER_END pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.539798 systemd[1]: sshd@24-10.200.8.46:22-10.200.16.10:55122.service: Deactivated successfully. Mar 17 18:53:21.540650 systemd[1]: session-27.scope: Deactivated successfully. Mar 17 18:53:21.541979 systemd-logind[1381]: Session 27 logged out. Waiting for processes to exit. Mar 17 18:53:21.542957 systemd-logind[1381]: Removed session 27. Mar 17 18:53:21.531000 audit[5556]: CRED_DISP pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.565210 kernel: audit: type=1106 audit(1742237601.531:1497): pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.565312 kernel: audit: type=1104 audit(1742237601.531:1498): pid=5556 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:53:21.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.46:22-10.200.16.10:55122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'