Mar 17 19:04:41.057997 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 19:04:41.058042 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:04:41.058058 kernel: BIOS-provided physical RAM map: Mar 17 19:04:41.058070 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Mar 17 19:04:41.058080 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Mar 17 19:04:41.058091 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Mar 17 19:04:41.058107 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Mar 17 19:04:41.058119 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Mar 17 19:04:41.058131 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Mar 17 19:04:41.058142 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Mar 17 19:04:41.058153 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Mar 17 19:04:41.058165 kernel: printk: bootconsole [earlyser0] enabled Mar 17 19:04:41.058176 kernel: NX (Execute Disable) protection: active Mar 17 19:04:41.058187 kernel: efi: EFI v2.70 by Microsoft Mar 17 19:04:41.058205 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Mar 17 19:04:41.058218 kernel: random: crng init done Mar 17 19:04:41.058230 kernel: SMBIOS 3.1.0 present. Mar 17 19:04:41.058242 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Mar 17 19:04:41.058255 kernel: Hypervisor detected: Microsoft Hyper-V Mar 17 19:04:41.058267 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Mar 17 19:04:41.058278 kernel: Hyper-V Host Build:20348-10.0-1-0.1799 Mar 17 19:04:41.058288 kernel: Hyper-V: Nested features: 0x1e0101 Mar 17 19:04:41.058302 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Mar 17 19:04:41.058313 kernel: Hyper-V: Using hypercall for remote TLB flush Mar 17 19:04:41.058322 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Mar 17 19:04:41.058333 kernel: tsc: Marking TSC unstable due to running on Hyper-V Mar 17 19:04:41.058343 kernel: tsc: Detected 2593.906 MHz processor Mar 17 19:04:41.058354 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 19:04:41.058365 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 19:04:41.058375 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Mar 17 19:04:41.058386 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 19:04:41.058397 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Mar 17 19:04:41.058412 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Mar 17 19:04:41.058425 kernel: Using GB pages for direct mapping Mar 17 19:04:41.058438 kernel: Secure boot disabled Mar 17 19:04:41.058449 kernel: ACPI: Early table checksum verification disabled Mar 17 19:04:41.058460 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Mar 17 19:04:41.058471 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058482 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058493 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Mar 17 19:04:41.058510 kernel: ACPI: FACS 0x000000003FFFE000 000040 Mar 17 19:04:41.058521 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058533 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058544 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058556 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058575 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058591 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058603 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 19:04:41.058614 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Mar 17 19:04:41.058626 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Mar 17 19:04:41.058642 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Mar 17 19:04:41.058654 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Mar 17 19:04:41.058667 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Mar 17 19:04:41.058679 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Mar 17 19:04:41.058693 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Mar 17 19:04:41.058717 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Mar 17 19:04:41.058729 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Mar 17 19:04:41.058741 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Mar 17 19:04:41.058753 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 19:04:41.058765 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 19:04:41.058777 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Mar 17 19:04:41.058788 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Mar 17 19:04:41.058800 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Mar 17 19:04:41.058816 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Mar 17 19:04:41.058828 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Mar 17 19:04:41.058840 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Mar 17 19:04:41.058852 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Mar 17 19:04:41.058863 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Mar 17 19:04:41.058876 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Mar 17 19:04:41.058888 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Mar 17 19:04:41.058900 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Mar 17 19:04:41.058912 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Mar 17 19:04:41.058928 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Mar 17 19:04:41.058941 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Mar 17 19:04:41.058953 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Mar 17 19:04:41.058965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Mar 17 19:04:41.058977 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Mar 17 19:04:41.058989 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Mar 17 19:04:41.059002 kernel: Zone ranges: Mar 17 19:04:41.059015 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 19:04:41.059026 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Mar 17 19:04:41.059041 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Mar 17 19:04:41.059054 kernel: Movable zone start for each node Mar 17 19:04:41.059066 kernel: Early memory node ranges Mar 17 19:04:41.059079 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Mar 17 19:04:41.059092 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Mar 17 19:04:41.059104 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Mar 17 19:04:41.059115 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Mar 17 19:04:41.059128 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Mar 17 19:04:41.059140 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 19:04:41.059155 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Mar 17 19:04:41.059168 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Mar 17 19:04:41.059181 kernel: ACPI: PM-Timer IO Port: 0x408 Mar 17 19:04:41.059193 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Mar 17 19:04:41.059206 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Mar 17 19:04:41.059220 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 19:04:41.059232 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 19:04:41.059244 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Mar 17 19:04:41.059256 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Mar 17 19:04:41.059271 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Mar 17 19:04:41.059284 kernel: Booting paravirtualized kernel on Hyper-V Mar 17 19:04:41.059296 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 19:04:41.059309 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Mar 17 19:04:41.059322 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Mar 17 19:04:41.059334 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Mar 17 19:04:41.059347 kernel: pcpu-alloc: [0] 0 1 Mar 17 19:04:41.059359 kernel: Hyper-V: PV spinlocks enabled Mar 17 19:04:41.059371 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 19:04:41.059387 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Mar 17 19:04:41.059399 kernel: Policy zone: Normal Mar 17 19:04:41.059414 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:04:41.059427 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 19:04:41.059439 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Mar 17 19:04:41.059451 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 19:04:41.059464 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 19:04:41.059477 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 308056K reserved, 0K cma-reserved) Mar 17 19:04:41.059492 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 19:04:41.059505 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 19:04:41.059528 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 19:04:41.059544 kernel: rcu: Hierarchical RCU implementation. Mar 17 19:04:41.059559 kernel: rcu: RCU event tracing is enabled. Mar 17 19:04:41.059573 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 19:04:41.059586 kernel: Rude variant of Tasks RCU enabled. Mar 17 19:04:41.059599 kernel: Tracing variant of Tasks RCU enabled. Mar 17 19:04:41.059612 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 19:04:41.059625 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 19:04:41.059638 kernel: Using NULL legacy PIC Mar 17 19:04:41.059654 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Mar 17 19:04:41.059667 kernel: Console: colour dummy device 80x25 Mar 17 19:04:41.059680 kernel: printk: console [tty1] enabled Mar 17 19:04:41.059693 kernel: printk: console [ttyS0] enabled Mar 17 19:04:41.059715 kernel: printk: bootconsole [earlyser0] disabled Mar 17 19:04:41.059731 kernel: ACPI: Core revision 20210730 Mar 17 19:04:41.059745 kernel: Failed to register legacy timer interrupt Mar 17 19:04:41.059757 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 19:04:41.059770 kernel: Hyper-V: Using IPI hypercalls Mar 17 19:04:41.059783 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Mar 17 19:04:41.059797 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Mar 17 19:04:41.059811 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Mar 17 19:04:41.059826 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 19:04:41.059841 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 19:04:41.059855 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 19:04:41.059870 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 19:04:41.059883 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Mar 17 19:04:41.059896 kernel: RETBleed: Vulnerable Mar 17 19:04:41.059908 kernel: Speculative Store Bypass: Vulnerable Mar 17 19:04:41.059920 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 19:04:41.059933 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Mar 17 19:04:41.059946 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 19:04:41.059958 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 19:04:41.059970 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 19:04:41.059983 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Mar 17 19:04:41.059998 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Mar 17 19:04:41.060010 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Mar 17 19:04:41.060023 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 19:04:41.060035 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Mar 17 19:04:41.060047 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Mar 17 19:04:41.060059 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Mar 17 19:04:41.060071 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Mar 17 19:04:41.060084 kernel: Freeing SMP alternatives memory: 32K Mar 17 19:04:41.060097 kernel: pid_max: default: 32768 minimum: 301 Mar 17 19:04:41.060109 kernel: LSM: Security Framework initializing Mar 17 19:04:41.060122 kernel: SELinux: Initializing. Mar 17 19:04:41.060135 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 19:04:41.060150 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 19:04:41.060163 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Mar 17 19:04:41.060176 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Mar 17 19:04:41.060190 kernel: signal: max sigframe size: 3632 Mar 17 19:04:41.060203 kernel: rcu: Hierarchical SRCU implementation. Mar 17 19:04:41.060216 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 19:04:41.060230 kernel: smp: Bringing up secondary CPUs ... Mar 17 19:04:41.060242 kernel: x86: Booting SMP configuration: Mar 17 19:04:41.060255 kernel: .... node #0, CPUs: #1 Mar 17 19:04:41.060269 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Mar 17 19:04:41.060286 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Mar 17 19:04:41.060299 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 19:04:41.060312 kernel: smpboot: Max logical packages: 1 Mar 17 19:04:41.060325 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Mar 17 19:04:41.060339 kernel: devtmpfs: initialized Mar 17 19:04:41.060352 kernel: x86/mm: Memory block size: 128MB Mar 17 19:04:41.060365 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Mar 17 19:04:41.060378 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 19:04:41.060395 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 19:04:41.060408 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 19:04:41.060421 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 19:04:41.060434 kernel: audit: initializing netlink subsys (disabled) Mar 17 19:04:41.060448 kernel: audit: type=2000 audit(1742238280.023:1): state=initialized audit_enabled=0 res=1 Mar 17 19:04:41.060460 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 19:04:41.060473 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 19:04:41.060486 kernel: cpuidle: using governor menu Mar 17 19:04:41.060499 kernel: ACPI: bus type PCI registered Mar 17 19:04:41.060516 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 19:04:41.060529 kernel: dca service started, version 1.12.1 Mar 17 19:04:41.060543 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 19:04:41.060557 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 19:04:41.060569 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 19:04:41.060581 kernel: ACPI: Added _OSI(Module Device) Mar 17 19:04:41.060592 kernel: ACPI: Added _OSI(Processor Device) Mar 17 19:04:41.060605 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 19:04:41.060619 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 19:04:41.060633 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 19:04:41.060646 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 19:04:41.060658 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 19:04:41.060669 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 19:04:41.060683 kernel: ACPI: Interpreter enabled Mar 17 19:04:41.060695 kernel: ACPI: PM: (supports S0 S5) Mar 17 19:04:41.060737 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 19:04:41.060751 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 19:04:41.060764 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Mar 17 19:04:41.060780 kernel: iommu: Default domain type: Translated Mar 17 19:04:41.060793 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 19:04:41.060806 kernel: vgaarb: loaded Mar 17 19:04:41.060819 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 19:04:41.060831 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 19:04:41.060842 kernel: PTP clock support registered Mar 17 19:04:41.060854 kernel: Registered efivars operations Mar 17 19:04:41.060866 kernel: PCI: Using ACPI for IRQ routing Mar 17 19:04:41.060878 kernel: PCI: System does not support PCI Mar 17 19:04:41.060894 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Mar 17 19:04:41.060907 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 19:04:41.060920 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 19:04:41.060933 kernel: pnp: PnP ACPI init Mar 17 19:04:41.060946 kernel: pnp: PnP ACPI: found 3 devices Mar 17 19:04:41.060959 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 19:04:41.060973 kernel: NET: Registered PF_INET protocol family Mar 17 19:04:41.060985 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 19:04:41.060998 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Mar 17 19:04:41.061014 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 19:04:41.061026 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 19:04:41.061040 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Mar 17 19:04:41.061053 kernel: TCP: Hash tables configured (established 65536 bind 65536) Mar 17 19:04:41.061066 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 19:04:41.061080 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Mar 17 19:04:41.061091 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 19:04:41.061104 kernel: NET: Registered PF_XDP protocol family Mar 17 19:04:41.061117 kernel: PCI: CLS 0 bytes, default 64 Mar 17 19:04:41.061134 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 19:04:41.061148 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Mar 17 19:04:41.061160 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 19:04:41.061172 kernel: Initialise system trusted keyrings Mar 17 19:04:41.061185 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Mar 17 19:04:41.061195 kernel: Key type asymmetric registered Mar 17 19:04:41.061206 kernel: Asymmetric key parser 'x509' registered Mar 17 19:04:41.061218 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 19:04:41.061231 kernel: io scheduler mq-deadline registered Mar 17 19:04:41.061249 kernel: io scheduler kyber registered Mar 17 19:04:41.061262 kernel: io scheduler bfq registered Mar 17 19:04:41.061277 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 19:04:41.061289 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 19:04:41.061302 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 19:04:41.061313 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Mar 17 19:04:41.061324 kernel: i8042: PNP: No PS/2 controller found. Mar 17 19:04:41.061491 kernel: rtc_cmos 00:02: registered as rtc0 Mar 17 19:04:41.061614 kernel: rtc_cmos 00:02: setting system clock to 2025-03-17T19:04:40 UTC (1742238280) Mar 17 19:04:41.061740 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Mar 17 19:04:41.061757 kernel: intel_pstate: CPU model not supported Mar 17 19:04:41.061772 kernel: efifb: probing for efifb Mar 17 19:04:41.061786 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Mar 17 19:04:41.061799 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Mar 17 19:04:41.061812 kernel: efifb: scrolling: redraw Mar 17 19:04:41.061826 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 17 19:04:41.061839 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 19:04:41.061856 kernel: fb0: EFI VGA frame buffer device Mar 17 19:04:41.061870 kernel: pstore: Registered efi as persistent store backend Mar 17 19:04:41.061883 kernel: NET: Registered PF_INET6 protocol family Mar 17 19:04:41.061896 kernel: Segment Routing with IPv6 Mar 17 19:04:41.061909 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 19:04:41.061922 kernel: NET: Registered PF_PACKET protocol family Mar 17 19:04:41.061936 kernel: Key type dns_resolver registered Mar 17 19:04:41.061949 kernel: IPI shorthand broadcast: enabled Mar 17 19:04:41.061963 kernel: sched_clock: Marking stable (750124800, 22140100)->(947848200, -175583300) Mar 17 19:04:41.061979 kernel: registered taskstats version 1 Mar 17 19:04:41.061989 kernel: Loading compiled-in X.509 certificates Mar 17 19:04:41.062000 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 19:04:41.062012 kernel: Key type .fscrypt registered Mar 17 19:04:41.062022 kernel: Key type fscrypt-provisioning registered Mar 17 19:04:41.062033 kernel: pstore: Using crash dump compression: deflate Mar 17 19:04:41.062044 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 19:04:41.062054 kernel: ima: Allocated hash algorithm: sha1 Mar 17 19:04:41.062070 kernel: ima: No architecture policies found Mar 17 19:04:41.062080 kernel: clk: Disabling unused clocks Mar 17 19:04:41.062090 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 19:04:41.062098 kernel: Write protecting the kernel read-only data: 28672k Mar 17 19:04:41.062105 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 19:04:41.063983 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 19:04:41.063996 kernel: Run /init as init process Mar 17 19:04:41.064009 kernel: with arguments: Mar 17 19:04:41.064022 kernel: /init Mar 17 19:04:41.064036 kernel: with environment: Mar 17 19:04:41.064049 kernel: HOME=/ Mar 17 19:04:41.064060 kernel: TERM=linux Mar 17 19:04:41.064072 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 19:04:41.064090 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 19:04:41.064105 systemd[1]: Detected virtualization microsoft. Mar 17 19:04:41.064117 systemd[1]: Detected architecture x86-64. Mar 17 19:04:41.064130 systemd[1]: Running in initrd. Mar 17 19:04:41.064147 systemd[1]: No hostname configured, using default hostname. Mar 17 19:04:41.064162 systemd[1]: Hostname set to . Mar 17 19:04:41.064178 systemd[1]: Initializing machine ID from random generator. Mar 17 19:04:41.064192 systemd[1]: Queued start job for default target initrd.target. Mar 17 19:04:41.064206 systemd[1]: Started systemd-ask-password-console.path. Mar 17 19:04:41.064220 systemd[1]: Reached target cryptsetup.target. Mar 17 19:04:41.064234 systemd[1]: Reached target paths.target. Mar 17 19:04:41.064249 systemd[1]: Reached target slices.target. Mar 17 19:04:41.064263 systemd[1]: Reached target swap.target. Mar 17 19:04:41.064279 systemd[1]: Reached target timers.target. Mar 17 19:04:41.064294 systemd[1]: Listening on iscsid.socket. Mar 17 19:04:41.064308 systemd[1]: Listening on iscsiuio.socket. Mar 17 19:04:41.064323 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 19:04:41.064337 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 19:04:41.064351 systemd[1]: Listening on systemd-journald.socket. Mar 17 19:04:41.064366 systemd[1]: Listening on systemd-networkd.socket. Mar 17 19:04:41.064383 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 19:04:41.064398 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 19:04:41.064412 systemd[1]: Reached target sockets.target. Mar 17 19:04:41.064427 systemd[1]: Starting kmod-static-nodes.service... Mar 17 19:04:41.064441 systemd[1]: Finished network-cleanup.service. Mar 17 19:04:41.064455 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 19:04:41.064470 systemd[1]: Starting systemd-journald.service... Mar 17 19:04:41.064484 systemd[1]: Starting systemd-modules-load.service... Mar 17 19:04:41.064499 systemd[1]: Starting systemd-resolved.service... Mar 17 19:04:41.064515 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 19:04:41.064536 systemd-journald[183]: Journal started Mar 17 19:04:41.064610 systemd-journald[183]: Runtime Journal (/run/log/journal/6c6d1442a22149c7a6d8630989b4cfa0) is 8.0M, max 159.0M, 151.0M free. Mar 17 19:04:41.063979 systemd-modules-load[184]: Inserted module 'overlay' Mar 17 19:04:41.088533 systemd[1]: Started systemd-journald.service. Mar 17 19:04:41.088601 kernel: audit: type=1130 audit(1742238281.076:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.077924 systemd[1]: Finished kmod-static-nodes.service. Mar 17 19:04:41.091210 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 19:04:41.095100 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 19:04:41.101489 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 19:04:41.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.120721 kernel: audit: type=1130 audit(1742238281.090:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.139913 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 19:04:41.149167 kernel: audit: type=1130 audit(1742238281.094:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.152157 systemd-resolved[185]: Positive Trust Anchors: Mar 17 19:04:41.153878 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 19:04:41.164716 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 19:04:41.172265 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 19:04:41.164823 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 19:04:41.166578 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 19:04:41.193720 kernel: Bridge firewalling registered Mar 17 19:04:41.173244 systemd[1]: Starting dracut-cmdline.service... Mar 17 19:04:41.236805 kernel: audit: type=1130 audit(1742238281.098:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.236853 kernel: audit: type=1130 audit(1742238281.166:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.236870 kernel: audit: type=1130 audit(1742238281.171:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.237034 dracut-cmdline[200]: dracut-dracut-053 Mar 17 19:04:41.237034 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Mar 17 19:04:41.237034 dracut-cmdline[200]: BEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 19:04:41.287460 kernel: audit: type=1130 audit(1742238281.231:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.188494 systemd-resolved[185]: Defaulting to hostname 'linux'. Mar 17 19:04:41.205536 systemd-modules-load[184]: Inserted module 'br_netfilter' Mar 17 19:04:41.229782 systemd[1]: Started systemd-resolved.service. Mar 17 19:04:41.232285 systemd[1]: Reached target nss-lookup.target. Mar 17 19:04:41.305725 kernel: SCSI subsystem initialized Mar 17 19:04:41.330510 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 19:04:41.330594 kernel: device-mapper: uevent: version 1.0.3 Mar 17 19:04:41.339264 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 19:04:41.339317 kernel: Loading iSCSI transport class v2.0-870. Mar 17 19:04:41.342125 systemd-modules-load[184]: Inserted module 'dm_multipath' Mar 17 19:04:41.344117 systemd[1]: Finished systemd-modules-load.service. Mar 17 19:04:41.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.362177 kernel: audit: type=1130 audit(1742238281.345:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.362516 systemd[1]: Starting systemd-sysctl.service... Mar 17 19:04:41.375411 systemd[1]: Finished systemd-sysctl.service. Mar 17 19:04:41.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.390725 kernel: audit: type=1130 audit(1742238281.377:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.390755 kernel: iscsi: registered transport (tcp) Mar 17 19:04:41.422204 kernel: iscsi: registered transport (qla4xxx) Mar 17 19:04:41.422297 kernel: QLogic iSCSI HBA Driver Mar 17 19:04:41.452606 systemd[1]: Finished dracut-cmdline.service. Mar 17 19:04:41.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.458500 systemd[1]: Starting dracut-pre-udev.service... Mar 17 19:04:41.509739 kernel: raid6: avx512x4 gen() 18351 MB/s Mar 17 19:04:41.529721 kernel: raid6: avx512x4 xor() 6965 MB/s Mar 17 19:04:41.549723 kernel: raid6: avx512x2 gen() 18333 MB/s Mar 17 19:04:41.569739 kernel: raid6: avx512x2 xor() 29849 MB/s Mar 17 19:04:41.589721 kernel: raid6: avx512x1 gen() 18358 MB/s Mar 17 19:04:41.609722 kernel: raid6: avx512x1 xor() 26825 MB/s Mar 17 19:04:41.630723 kernel: raid6: avx2x4 gen() 18433 MB/s Mar 17 19:04:41.650722 kernel: raid6: avx2x4 xor() 6791 MB/s Mar 17 19:04:41.670721 kernel: raid6: avx2x2 gen() 18325 MB/s Mar 17 19:04:41.690724 kernel: raid6: avx2x2 xor() 22267 MB/s Mar 17 19:04:41.710722 kernel: raid6: avx2x1 gen() 13939 MB/s Mar 17 19:04:41.730719 kernel: raid6: avx2x1 xor() 19201 MB/s Mar 17 19:04:41.750721 kernel: raid6: sse2x4 gen() 11493 MB/s Mar 17 19:04:41.770719 kernel: raid6: sse2x4 xor() 5968 MB/s Mar 17 19:04:41.789719 kernel: raid6: sse2x2 gen() 12553 MB/s Mar 17 19:04:41.809724 kernel: raid6: sse2x2 xor() 7591 MB/s Mar 17 19:04:41.828720 kernel: raid6: sse2x1 gen() 11613 MB/s Mar 17 19:04:41.851436 kernel: raid6: sse2x1 xor() 5953 MB/s Mar 17 19:04:41.851459 kernel: raid6: using algorithm avx2x4 gen() 18433 MB/s Mar 17 19:04:41.851474 kernel: raid6: .... xor() 6791 MB/s, rmw enabled Mar 17 19:04:41.854634 kernel: raid6: using avx512x2 recovery algorithm Mar 17 19:04:41.873739 kernel: xor: automatically using best checksumming function avx Mar 17 19:04:41.969747 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 19:04:41.978249 systemd[1]: Finished dracut-pre-udev.service. Mar 17 19:04:41.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:41.981000 audit: BPF prog-id=7 op=LOAD Mar 17 19:04:41.981000 audit: BPF prog-id=8 op=LOAD Mar 17 19:04:41.982806 systemd[1]: Starting systemd-udevd.service... Mar 17 19:04:41.998453 systemd-udevd[384]: Using default interface naming scheme 'v252'. Mar 17 19:04:42.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:42.005177 systemd[1]: Started systemd-udevd.service. Mar 17 19:04:42.010956 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 19:04:42.029186 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Mar 17 19:04:42.062012 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 19:04:42.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:42.065666 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 19:04:42.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:42.104677 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 19:04:42.163734 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 19:04:42.188180 kernel: AVX2 version of gcm_enc/dec engaged. Mar 17 19:04:42.188260 kernel: AES CTR mode by8 optimization enabled Mar 17 19:04:42.188726 kernel: hv_vmbus: Vmbus version:5.2 Mar 17 19:04:42.199735 kernel: hv_vmbus: registering driver hyperv_keyboard Mar 17 19:04:42.210029 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Mar 17 19:04:42.231165 kernel: hid: raw HID events driver (C) Jiri Kosina Mar 17 19:04:42.238730 kernel: hv_vmbus: registering driver hv_storvsc Mar 17 19:04:42.242726 kernel: scsi host0: storvsc_host_t Mar 17 19:04:42.242812 kernel: hv_vmbus: registering driver hv_netvsc Mar 17 19:04:42.247442 kernel: scsi host1: storvsc_host_t Mar 17 19:04:42.250748 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Mar 17 19:04:42.260730 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Mar 17 19:04:42.280730 kernel: hv_vmbus: registering driver hid_hyperv Mar 17 19:04:42.293736 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Mar 17 19:04:42.307651 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 17 19:04:42.307675 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Mar 17 19:04:42.307692 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Mar 17 19:04:42.307863 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Mar 17 19:04:42.320029 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Mar 17 19:04:42.341299 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Mar 17 19:04:42.341481 kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 17 19:04:42.341641 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Mar 17 19:04:42.341807 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Mar 17 19:04:42.341958 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 19:04:42.341978 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 17 19:04:42.433112 kernel: hv_netvsc 7c1e5236-51e2-7c1e-5236-51e27c1e5236 eth0: VF slot 1 added Mar 17 19:04:42.442729 kernel: hv_vmbus: registering driver hv_pci Mar 17 19:04:42.448736 kernel: hv_pci cdcc9b59-310a-43c3-97c7-262757eef4ff: PCI VMBus probing: Using version 0x10004 Mar 17 19:04:42.522760 kernel: hv_pci cdcc9b59-310a-43c3-97c7-262757eef4ff: PCI host bridge to bus 310a:00 Mar 17 19:04:42.522964 kernel: pci_bus 310a:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Mar 17 19:04:42.523139 kernel: pci_bus 310a:00: No busn resource found for root bus, will use [bus 00-ff] Mar 17 19:04:42.523285 kernel: pci 310a:00:02.0: [15b3:1016] type 00 class 0x020000 Mar 17 19:04:42.523462 kernel: pci 310a:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Mar 17 19:04:42.523629 kernel: pci 310a:00:02.0: enabling Extended Tags Mar 17 19:04:42.523802 kernel: pci 310a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 310a:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Mar 17 19:04:42.523967 kernel: pci_bus 310a:00: busn_res: [bus 00-ff] end is updated to 00 Mar 17 19:04:42.524112 kernel: pci 310a:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Mar 17 19:04:42.615739 kernel: mlx5_core 310a:00:02.0: firmware version: 14.30.5000 Mar 17 19:04:42.874205 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (445) Mar 17 19:04:42.874231 kernel: mlx5_core 310a:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Mar 17 19:04:42.874431 kernel: mlx5_core 310a:00:02.0: Supported tc offload range - chains: 1, prios: 1 Mar 17 19:04:42.874555 kernel: mlx5_core 310a:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Mar 17 19:04:42.874657 kernel: hv_netvsc 7c1e5236-51e2-7c1e-5236-51e27c1e5236 eth0: VF registering: eth1 Mar 17 19:04:42.874778 kernel: mlx5_core 310a:00:02.0 eth1: joined to eth0 Mar 17 19:04:42.705557 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 19:04:42.762199 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 19:04:42.885742 kernel: mlx5_core 310a:00:02.0 enP12554s1: renamed from eth1 Mar 17 19:04:42.907904 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 19:04:42.976370 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 19:04:42.979582 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 19:04:42.986594 systemd[1]: Starting disk-uuid.service... Mar 17 19:04:43.005730 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 19:04:43.015737 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 19:04:43.022736 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 19:04:44.022734 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 19:04:44.022804 disk-uuid[560]: The operation has completed successfully. Mar 17 19:04:44.098165 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 19:04:44.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.098281 systemd[1]: Finished disk-uuid.service. Mar 17 19:04:44.109945 systemd[1]: Starting verity-setup.service... Mar 17 19:04:44.161790 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Mar 17 19:04:44.550363 systemd[1]: Found device dev-mapper-usr.device. Mar 17 19:04:44.554593 systemd[1]: Mounting sysusr-usr.mount... Mar 17 19:04:44.560277 systemd[1]: Finished verity-setup.service. Mar 17 19:04:44.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.633736 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 19:04:44.633718 systemd[1]: Mounted sysusr-usr.mount. Mar 17 19:04:44.635830 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 19:04:44.636680 systemd[1]: Starting ignition-setup.service... Mar 17 19:04:44.666904 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:04:44.666946 kernel: BTRFS info (device sda6): using free space tree Mar 17 19:04:44.666966 kernel: BTRFS info (device sda6): has skinny extents Mar 17 19:04:44.649702 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 19:04:44.718913 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 19:04:44.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.723000 audit: BPF prog-id=9 op=LOAD Mar 17 19:04:44.724802 systemd[1]: Starting systemd-networkd.service... Mar 17 19:04:44.751873 systemd-networkd[824]: lo: Link UP Mar 17 19:04:44.751885 systemd-networkd[824]: lo: Gained carrier Mar 17 19:04:44.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.753135 systemd-networkd[824]: Enumeration completed Mar 17 19:04:44.753434 systemd[1]: Started systemd-networkd.service. Mar 17 19:04:44.756154 systemd[1]: Reached target network.target. Mar 17 19:04:44.758098 systemd-networkd[824]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 19:04:44.770531 systemd[1]: Starting iscsiuio.service... Mar 17 19:04:44.780964 systemd[1]: Started iscsiuio.service. Mar 17 19:04:44.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.785739 systemd[1]: Starting iscsid.service... Mar 17 19:04:44.792397 iscsid[832]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 19:04:44.792397 iscsid[832]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 19:04:44.792397 iscsid[832]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 19:04:44.792397 iscsid[832]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 19:04:44.792397 iscsid[832]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 19:04:44.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.822436 iscsid[832]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 19:04:44.810343 systemd[1]: Started iscsid.service. Mar 17 19:04:44.812989 systemd[1]: Starting dracut-initqueue.service... Mar 17 19:04:44.836995 kernel: mlx5_core 310a:00:02.0 enP12554s1: Link up Mar 17 19:04:44.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.834208 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 19:04:44.834753 systemd[1]: Finished dracut-initqueue.service. Mar 17 19:04:44.837059 systemd[1]: Reached target remote-fs-pre.target. Mar 17 19:04:44.839178 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 19:04:44.841361 systemd[1]: Reached target remote-fs.target. Mar 17 19:04:44.872173 kernel: hv_netvsc 7c1e5236-51e2-7c1e-5236-51e27c1e5236 eth0: Data path switched to VF: enP12554s1 Mar 17 19:04:44.872366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:04:44.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.844254 systemd[1]: Starting dracut-pre-mount.service... Mar 17 19:04:44.863773 systemd[1]: Finished dracut-pre-mount.service. Mar 17 19:04:44.870403 systemd-networkd[824]: enP12554s1: Link UP Mar 17 19:04:44.870605 systemd-networkd[824]: eth0: Link UP Mar 17 19:04:44.871038 systemd-networkd[824]: eth0: Gained carrier Mar 17 19:04:44.877313 systemd-networkd[824]: enP12554s1: Gained carrier Mar 17 19:04:44.902831 systemd-networkd[824]: eth0: DHCPv4 address 10.200.8.16/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 19:04:44.944463 systemd[1]: Finished ignition-setup.service. Mar 17 19:04:44.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:44.948211 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 19:04:45.984084 systemd-networkd[824]: eth0: Gained IPv6LL Mar 17 19:04:48.159166 ignition[851]: Ignition 2.14.0 Mar 17 19:04:48.159189 ignition[851]: Stage: fetch-offline Mar 17 19:04:48.159285 ignition[851]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:48.159354 ignition[851]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:48.264097 ignition[851]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:48.264294 ignition[851]: parsed url from cmdline: "" Mar 17 19:04:48.264297 ignition[851]: no config URL provided Mar 17 19:04:48.264303 ignition[851]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 19:04:48.264311 ignition[851]: no config at "/usr/lib/ignition/user.ign" Mar 17 19:04:48.264317 ignition[851]: failed to fetch config: resource requires networking Mar 17 19:04:48.268867 ignition[851]: Ignition finished successfully Mar 17 19:04:48.278683 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 19:04:48.288183 kernel: kauditd_printk_skb: 18 callbacks suppressed Mar 17 19:04:48.288243 kernel: audit: type=1130 audit(1742238288.282:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.284133 systemd[1]: Starting ignition-fetch.service... Mar 17 19:04:48.293247 ignition[857]: Ignition 2.14.0 Mar 17 19:04:48.293255 ignition[857]: Stage: fetch Mar 17 19:04:48.293373 ignition[857]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:48.293400 ignition[857]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:48.298363 ignition[857]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:48.299083 ignition[857]: parsed url from cmdline: "" Mar 17 19:04:48.299092 ignition[857]: no config URL provided Mar 17 19:04:48.299108 ignition[857]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 19:04:48.309194 ignition[857]: no config at "/usr/lib/ignition/user.ign" Mar 17 19:04:48.309252 ignition[857]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Mar 17 19:04:48.383524 ignition[857]: GET result: OK Mar 17 19:04:48.383556 ignition[857]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Mar 17 19:04:48.489797 ignition[857]: opening config device: "/dev/sr0" Mar 17 19:04:48.490226 ignition[857]: getting drive status for "/dev/sr0" Mar 17 19:04:48.490321 ignition[857]: drive status: OK Mar 17 19:04:48.490383 ignition[857]: mounting config device Mar 17 19:04:48.490403 ignition[857]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure3197036283" Mar 17 19:04:48.516642 ignition[857]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure3197036283" Mar 17 19:04:48.519963 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2025/03/18 00:00 (1000) Mar 17 19:04:48.519022 systemd[1]: tmp-ignition\x2dazure3197036283.mount: Deactivated successfully. Mar 17 19:04:48.517700 ignition[857]: checking for config drive Mar 17 19:04:48.518178 ignition[857]: reading config Mar 17 19:04:48.518614 ignition[857]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure3197036283" Mar 17 19:04:48.519791 ignition[857]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure3197036283" Mar 17 19:04:48.523686 unknown[857]: fetched base config from "system" Mar 17 19:04:48.519808 ignition[857]: config has been read from custom data Mar 17 19:04:48.523694 unknown[857]: fetched base config from "system" Mar 17 19:04:48.519862 ignition[857]: parsing config with SHA512: dca69924894b9dba13cdd8d5cb7c0bb8b43a8b71f1606247474fbbd6dee307a44836818120cd52b3232bcec532e198271eeb13f171097795d48fe39d0c3aabfc Mar 17 19:04:48.523703 unknown[857]: fetched user config from "azure" Mar 17 19:04:48.524252 ignition[857]: fetch: fetch complete Mar 17 19:04:48.524257 ignition[857]: fetch: fetch passed Mar 17 19:04:48.537245 systemd[1]: Finished ignition-fetch.service. Mar 17 19:04:48.524295 ignition[857]: Ignition finished successfully Mar 17 19:04:48.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.546684 systemd[1]: Starting ignition-kargs.service... Mar 17 19:04:48.561264 kernel: audit: type=1130 audit(1742238288.544:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.570396 ignition[865]: Ignition 2.14.0 Mar 17 19:04:48.570409 ignition[865]: Stage: kargs Mar 17 19:04:48.570550 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:48.570584 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:48.580739 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:48.581883 ignition[865]: kargs: kargs passed Mar 17 19:04:48.581933 ignition[865]: Ignition finished successfully Mar 17 19:04:48.587333 systemd[1]: Finished ignition-kargs.service. Mar 17 19:04:48.590447 systemd[1]: Starting ignition-disks.service... Mar 17 19:04:48.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.607732 kernel: audit: type=1130 audit(1742238288.588:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.611481 ignition[871]: Ignition 2.14.0 Mar 17 19:04:48.611491 ignition[871]: Stage: disks Mar 17 19:04:48.611643 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:48.611680 ignition[871]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:48.620452 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:48.624570 ignition[871]: disks: disks passed Mar 17 19:04:48.624630 ignition[871]: Ignition finished successfully Mar 17 19:04:48.628674 systemd[1]: Finished ignition-disks.service. Mar 17 19:04:48.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.630703 systemd[1]: Reached target initrd-root-device.target. Mar 17 19:04:48.648455 kernel: audit: type=1130 audit(1742238288.629:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.644261 systemd[1]: Reached target local-fs-pre.target. Mar 17 19:04:48.648426 systemd[1]: Reached target local-fs.target. Mar 17 19:04:48.652071 systemd[1]: Reached target sysinit.target. Mar 17 19:04:48.655739 systemd[1]: Reached target basic.target. Mar 17 19:04:48.662081 systemd[1]: Starting systemd-fsck-root.service... Mar 17 19:04:48.722135 systemd-fsck[879]: ROOT: clean, 623/7326000 files, 481078/7359488 blocks Mar 17 19:04:48.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.726292 systemd[1]: Finished systemd-fsck-root.service. Mar 17 19:04:48.743750 kernel: audit: type=1130 audit(1742238288.725:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:48.739729 systemd[1]: Mounting sysroot.mount... Mar 17 19:04:48.757726 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 19:04:48.758565 systemd[1]: Mounted sysroot.mount. Mar 17 19:04:48.762466 systemd[1]: Reached target initrd-root-fs.target. Mar 17 19:04:48.805937 systemd[1]: Mounting sysroot-usr.mount... Mar 17 19:04:48.812208 systemd[1]: Starting flatcar-metadata-hostname.service... Mar 17 19:04:48.817039 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 19:04:48.817084 systemd[1]: Reached target ignition-diskful.target. Mar 17 19:04:48.824406 systemd[1]: Mounted sysroot-usr.mount. Mar 17 19:04:48.867838 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 19:04:48.873656 systemd[1]: Starting initrd-setup-root.service... Mar 17 19:04:48.896149 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (889) Mar 17 19:04:48.896211 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:04:48.896224 kernel: BTRFS info (device sda6): using free space tree Mar 17 19:04:48.896327 initrd-setup-root[894]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 19:04:48.905974 kernel: BTRFS info (device sda6): has skinny extents Mar 17 19:04:48.909441 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 19:04:48.916913 initrd-setup-root[920]: cut: /sysroot/etc/group: No such file or directory Mar 17 19:04:48.956303 initrd-setup-root[928]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 19:04:48.963571 initrd-setup-root[936]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 19:04:49.488912 systemd[1]: Finished initrd-setup-root.service. Mar 17 19:04:49.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.509642 kernel: audit: type=1130 audit(1742238289.490:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.504384 systemd[1]: Starting ignition-mount.service... Mar 17 19:04:49.512416 systemd[1]: Starting sysroot-boot.service... Mar 17 19:04:49.520089 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 19:04:49.520240 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 19:04:49.536202 systemd[1]: Finished sysroot-boot.service. Mar 17 19:04:49.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.551730 kernel: audit: type=1130 audit(1742238289.537:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.561998 ignition[957]: INFO : Ignition 2.14.0 Mar 17 19:04:49.561998 ignition[957]: INFO : Stage: mount Mar 17 19:04:49.566359 ignition[957]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:49.566359 ignition[957]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:49.577189 ignition[957]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:49.577189 ignition[957]: INFO : mount: mount passed Mar 17 19:04:49.577189 ignition[957]: INFO : Ignition finished successfully Mar 17 19:04:49.595820 kernel: audit: type=1130 audit(1742238289.576:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:49.573493 systemd[1]: Finished ignition-mount.service. Mar 17 19:04:50.247110 coreos-metadata[888]: Mar 17 19:04:50.246 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Mar 17 19:04:50.269554 coreos-metadata[888]: Mar 17 19:04:50.269 INFO Fetch successful Mar 17 19:04:50.305426 coreos-metadata[888]: Mar 17 19:04:50.305 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Mar 17 19:04:50.320885 coreos-metadata[888]: Mar 17 19:04:50.320 INFO Fetch successful Mar 17 19:04:50.336061 coreos-metadata[888]: Mar 17 19:04:50.336 INFO wrote hostname ci-3510.3.7-a-9eb0e2b4dd to /sysroot/etc/hostname Mar 17 19:04:50.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:50.338207 systemd[1]: Finished flatcar-metadata-hostname.service. Mar 17 19:04:50.357348 kernel: audit: type=1130 audit(1742238290.341:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:50.343550 systemd[1]: Starting ignition-files.service... Mar 17 19:04:50.363897 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 19:04:50.375729 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (967) Mar 17 19:04:50.387948 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 19:04:50.387994 kernel: BTRFS info (device sda6): using free space tree Mar 17 19:04:50.388006 kernel: BTRFS info (device sda6): has skinny extents Mar 17 19:04:50.393918 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 19:04:50.407652 ignition[986]: INFO : Ignition 2.14.0 Mar 17 19:04:50.407652 ignition[986]: INFO : Stage: files Mar 17 19:04:50.411819 ignition[986]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:50.411819 ignition[986]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:50.426412 ignition[986]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:50.441758 ignition[986]: DEBUG : files: compiled without relabeling support, skipping Mar 17 19:04:50.445163 ignition[986]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 19:04:50.445163 ignition[986]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 19:04:50.496375 ignition[986]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 19:04:50.500648 ignition[986]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 19:04:50.508729 unknown[986]: wrote ssh authorized keys file for user: core Mar 17 19:04:50.511389 ignition[986]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 19:04:50.515124 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 19:04:50.519750 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Mar 17 19:04:50.574348 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Mar 17 19:04:50.687471 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Mar 17 19:04:50.692203 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Mar 17 19:04:50.696612 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 19:04:50.696612 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Mar 17 19:04:50.705259 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Mar 17 19:04:50.705259 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 19:04:50.713821 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 19:04:50.713821 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 19:04:50.722196 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 19:04:50.726629 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 19:04:50.731168 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 19:04:50.735440 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 19:04:50.741757 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 19:04:50.752972 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 19:04:50.757922 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 19:04:50.768742 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3848817888" Mar 17 19:04:50.768742 ignition[986]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3848817888": device or resource busy Mar 17 19:04:50.768742 ignition[986]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3848817888", trying btrfs: device or resource busy Mar 17 19:04:50.768742 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3848817888" Mar 17 19:04:50.768742 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3848817888" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3848817888" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3848817888" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1497931508" Mar 17 19:04:50.796010 ignition[986]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1497931508": device or resource busy Mar 17 19:04:50.796010 ignition[986]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1497931508", trying btrfs: device or resource busy Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1497931508" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1497931508" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1497931508" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1497931508" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 19:04:50.796010 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 19:04:50.776357 systemd[1]: mnt-oem3848817888.mount: Deactivated successfully. Mar 17 19:04:50.868704 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Mar 17 19:04:50.790353 systemd[1]: mnt-oem1497931508.mount: Deactivated successfully. Mar 17 19:04:51.360996 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Mar 17 19:04:51.895517 ignition[986]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Mar 17 19:04:51.895517 ignition[986]: INFO : files: op(13): [started] processing unit "waagent.service" Mar 17 19:04:51.895517 ignition[986]: INFO : files: op(13): [finished] processing unit "waagent.service" Mar 17 19:04:51.895517 ignition[986]: INFO : files: op(14): [started] processing unit "nvidia.service" Mar 17 19:04:51.895517 ignition[986]: INFO : files: op(14): [finished] processing unit "nvidia.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Mar 17 19:04:51.906947 ignition[986]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 19:04:51.906947 ignition[986]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 19:04:51.906947 ignition[986]: INFO : files: files passed Mar 17 19:04:51.906947 ignition[986]: INFO : Ignition finished successfully Mar 17 19:04:51.902172 systemd[1]: Finished ignition-files.service. Mar 17 19:04:51.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:51.964400 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 19:04:51.976347 kernel: audit: type=1130 audit(1742238291.962:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:51.979936 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 19:04:51.985439 systemd[1]: Starting ignition-quench.service... Mar 17 19:04:51.989529 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 19:04:51.991856 systemd[1]: Finished ignition-quench.service. Mar 17 19:04:51.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:51.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.008999 initrd-setup-root-after-ignition[1012]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 19:04:52.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.009615 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 19:04:52.016038 systemd[1]: Reached target ignition-complete.target. Mar 17 19:04:52.021418 systemd[1]: Starting initrd-parse-etc.service... Mar 17 19:04:52.037842 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 19:04:52.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.037970 systemd[1]: Finished initrd-parse-etc.service. Mar 17 19:04:52.042763 systemd[1]: Reached target initrd-fs.target. Mar 17 19:04:52.046783 systemd[1]: Reached target initrd.target. Mar 17 19:04:52.050460 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 19:04:52.051499 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 19:04:52.064695 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 19:04:52.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.069571 systemd[1]: Starting initrd-cleanup.service... Mar 17 19:04:52.079944 systemd[1]: Stopped target nss-lookup.target. Mar 17 19:04:52.084238 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 19:04:52.086918 systemd[1]: Stopped target timers.target. Mar 17 19:04:52.090593 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 19:04:52.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.090726 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 19:04:52.094580 systemd[1]: Stopped target initrd.target. Mar 17 19:04:52.098642 systemd[1]: Stopped target basic.target. Mar 17 19:04:52.102401 systemd[1]: Stopped target ignition-complete.target. Mar 17 19:04:52.106184 systemd[1]: Stopped target ignition-diskful.target. Mar 17 19:04:52.110255 systemd[1]: Stopped target initrd-root-device.target. Mar 17 19:04:52.114554 systemd[1]: Stopped target remote-fs.target. Mar 17 19:04:52.118856 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 19:04:52.122980 systemd[1]: Stopped target sysinit.target. Mar 17 19:04:52.126774 systemd[1]: Stopped target local-fs.target. Mar 17 19:04:52.130627 systemd[1]: Stopped target local-fs-pre.target. Mar 17 19:04:52.134518 systemd[1]: Stopped target swap.target. Mar 17 19:04:52.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.138139 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 19:04:52.138296 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 19:04:52.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.142271 systemd[1]: Stopped target cryptsetup.target. Mar 17 19:04:52.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.145788 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 19:04:52.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.145949 systemd[1]: Stopped dracut-initqueue.service. Mar 17 19:04:52.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.150340 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 19:04:52.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.179665 iscsid[832]: iscsid shutting down. Mar 17 19:04:52.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.150470 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 19:04:52.154773 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 19:04:52.191103 ignition[1025]: INFO : Ignition 2.14.0 Mar 17 19:04:52.191103 ignition[1025]: INFO : Stage: umount Mar 17 19:04:52.191103 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 19:04:52.191103 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 19:04:52.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.154904 systemd[1]: Stopped ignition-files.service. Mar 17 19:04:52.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.211883 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 19:04:52.211883 ignition[1025]: INFO : umount: umount passed Mar 17 19:04:52.211883 ignition[1025]: INFO : Ignition finished successfully Mar 17 19:04:52.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.158478 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Mar 17 19:04:52.158609 systemd[1]: Stopped flatcar-metadata-hostname.service. Mar 17 19:04:52.164052 systemd[1]: Stopping ignition-mount.service... Mar 17 19:04:52.167023 systemd[1]: Stopping iscsid.service... Mar 17 19:04:52.169912 systemd[1]: Stopping sysroot-boot.service... Mar 17 19:04:52.171807 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 19:04:52.172001 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 19:04:52.174422 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 19:04:52.174578 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 19:04:52.183779 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 19:04:52.183903 systemd[1]: Stopped iscsid.service. Mar 17 19:04:52.199208 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 19:04:52.199335 systemd[1]: Finished initrd-cleanup.service. Mar 17 19:04:52.209916 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 19:04:52.210025 systemd[1]: Stopped ignition-mount.service. Mar 17 19:04:52.252319 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 19:04:52.254726 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 19:04:52.256840 systemd[1]: Stopped ignition-disks.service. Mar 17 19:04:52.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.260528 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 19:04:52.262816 systemd[1]: Stopped ignition-kargs.service. Mar 17 19:04:52.266853 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 19:04:52.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.267338 systemd[1]: Stopped ignition-fetch.service. Mar 17 19:04:52.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.271061 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 19:04:52.271124 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 19:04:52.275155 systemd[1]: Stopped target paths.target. Mar 17 19:04:52.277000 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 19:04:52.281753 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 19:04:52.284104 systemd[1]: Stopped target slices.target. Mar 17 19:04:52.286113 systemd[1]: Stopped target sockets.target. Mar 17 19:04:52.291271 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 19:04:52.291325 systemd[1]: Closed iscsid.socket. Mar 17 19:04:52.297153 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 19:04:52.298786 systemd[1]: Stopped ignition-setup.service. Mar 17 19:04:52.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.309596 systemd[1]: Stopping iscsiuio.service... Mar 17 19:04:52.312092 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 19:04:52.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.312211 systemd[1]: Stopped iscsiuio.service. Mar 17 19:04:52.314995 systemd[1]: Stopped target network.target. Mar 17 19:04:52.319173 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 19:04:52.319219 systemd[1]: Closed iscsiuio.socket. Mar 17 19:04:52.321232 systemd[1]: Stopping systemd-networkd.service... Mar 17 19:04:52.324881 systemd[1]: Stopping systemd-resolved.service... Mar 17 19:04:52.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.329848 systemd-networkd[824]: eth0: DHCPv6 lease lost Mar 17 19:04:52.333197 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 19:04:52.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.344000 audit: BPF prog-id=9 op=UNLOAD Mar 17 19:04:52.347000 audit: BPF prog-id=6 op=UNLOAD Mar 17 19:04:52.333322 systemd[1]: Stopped systemd-networkd.service. Mar 17 19:04:52.338653 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 19:04:52.338774 systemd[1]: Stopped systemd-resolved.service. Mar 17 19:04:52.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.345133 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 19:04:52.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.345185 systemd[1]: Closed systemd-networkd.socket. Mar 17 19:04:52.348870 systemd[1]: Stopping network-cleanup.service... Mar 17 19:04:52.353852 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 19:04:52.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.353936 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 19:04:52.358038 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 19:04:52.358102 systemd[1]: Stopped systemd-sysctl.service. Mar 17 19:04:52.362455 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 19:04:52.362506 systemd[1]: Stopped systemd-modules-load.service. Mar 17 19:04:52.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.364930 systemd[1]: Stopping systemd-udevd.service... Mar 17 19:04:52.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.371959 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 19:04:52.372579 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 19:04:52.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.372728 systemd[1]: Stopped systemd-udevd.service. Mar 17 19:04:52.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.378830 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 19:04:52.378883 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 19:04:52.384390 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 19:04:52.384436 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 19:04:52.435160 kernel: hv_netvsc 7c1e5236-51e2-7c1e-5236-51e27c1e5236 eth0: Data path switched from VF: enP12554s1 Mar 17 19:04:52.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.388640 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 19:04:52.388701 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 19:04:52.392895 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 19:04:52.392954 systemd[1]: Stopped dracut-cmdline.service. Mar 17 19:04:52.395000 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 19:04:52.395046 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 19:04:52.399964 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 19:04:52.404826 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 19:04:52.404913 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 19:04:52.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.407487 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 19:04:52.407543 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 19:04:52.410130 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 19:04:52.410194 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 19:04:52.424986 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 19:04:52.425604 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 19:04:52.425696 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 19:04:52.454375 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 19:04:52.454486 systemd[1]: Stopped network-cleanup.service. Mar 17 19:04:52.714646 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 19:04:52.714813 systemd[1]: Stopped sysroot-boot.service. Mar 17 19:04:52.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.721886 systemd[1]: Reached target initrd-switch-root.target. Mar 17 19:04:52.726774 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 19:04:52.729175 systemd[1]: Stopped initrd-setup-root.service. Mar 17 19:04:52.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:52.733964 systemd[1]: Starting initrd-switch-root.service... Mar 17 19:04:52.745292 systemd[1]: Switching root. Mar 17 19:04:52.768529 systemd-journald[183]: Journal stopped Mar 17 19:05:09.695413 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Mar 17 19:05:09.695443 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 19:05:09.695457 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 19:05:09.695468 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 19:05:09.695479 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 19:05:09.695487 kernel: SELinux: policy capability open_perms=1 Mar 17 19:05:09.695501 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 19:05:09.695513 kernel: SELinux: policy capability always_check_network=0 Mar 17 19:05:09.695522 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 19:05:09.695530 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 19:05:09.695540 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 19:05:09.695549 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 19:05:09.695560 kernel: kauditd_printk_skb: 43 callbacks suppressed Mar 17 19:05:09.695569 kernel: audit: type=1403 audit(1742238295.541:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 19:05:09.695584 systemd[1]: Successfully loaded SELinux policy in 379.307ms. Mar 17 19:05:09.695597 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.711ms. Mar 17 19:05:09.695607 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 19:05:09.695623 systemd[1]: Detected virtualization microsoft. Mar 17 19:05:09.695638 systemd[1]: Detected architecture x86-64. Mar 17 19:05:09.695648 systemd[1]: Detected first boot. Mar 17 19:05:09.695659 systemd[1]: Hostname set to . Mar 17 19:05:09.695670 systemd[1]: Initializing machine ID from random generator. Mar 17 19:05:09.695681 kernel: audit: type=1400 audit(1742238296.349:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 19:05:09.695691 kernel: audit: type=1400 audit(1742238296.365:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:05:09.695703 kernel: audit: type=1400 audit(1742238296.365:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:05:09.695728 kernel: audit: type=1334 audit(1742238296.389:86): prog-id=10 op=LOAD Mar 17 19:05:09.695739 kernel: audit: type=1334 audit(1742238296.389:87): prog-id=10 op=UNLOAD Mar 17 19:05:09.695751 kernel: audit: type=1334 audit(1742238296.398:88): prog-id=11 op=LOAD Mar 17 19:05:09.695760 kernel: audit: type=1334 audit(1742238296.398:89): prog-id=11 op=UNLOAD Mar 17 19:05:09.695771 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 19:05:09.695782 kernel: audit: type=1400 audit(1742238297.808:90): avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 19:05:09.695794 kernel: audit: type=1300 audit(1742238297.808:90): arch=c000003e syscall=188 success=yes exit=0 a0=c0001078cc a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:05:09.695805 systemd[1]: Populated /etc with preset unit settings. Mar 17 19:05:09.695818 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:05:09.695830 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:05:09.695840 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:05:09.695853 kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 17 19:05:09.695863 kernel: audit: type=1334 audit(1742238309.106:92): prog-id=12 op=LOAD Mar 17 19:05:09.695873 kernel: audit: type=1334 audit(1742238309.106:93): prog-id=3 op=UNLOAD Mar 17 19:05:09.695888 kernel: audit: type=1334 audit(1742238309.111:94): prog-id=13 op=LOAD Mar 17 19:05:09.695902 kernel: audit: type=1334 audit(1742238309.115:95): prog-id=14 op=LOAD Mar 17 19:05:09.695912 kernel: audit: type=1334 audit(1742238309.115:96): prog-id=4 op=UNLOAD Mar 17 19:05:09.695922 kernel: audit: type=1334 audit(1742238309.115:97): prog-id=5 op=UNLOAD Mar 17 19:05:09.695934 kernel: audit: type=1334 audit(1742238309.120:98): prog-id=15 op=LOAD Mar 17 19:05:09.695946 kernel: audit: type=1334 audit(1742238309.120:99): prog-id=12 op=UNLOAD Mar 17 19:05:09.695955 kernel: audit: type=1334 audit(1742238309.139:100): prog-id=16 op=LOAD Mar 17 19:05:09.695967 kernel: audit: type=1334 audit(1742238309.143:101): prog-id=17 op=LOAD Mar 17 19:05:09.695978 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 19:05:09.695990 systemd[1]: Stopped initrd-switch-root.service. Mar 17 19:05:09.696003 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 19:05:09.696017 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 19:05:09.696026 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 19:05:09.696039 systemd[1]: Created slice system-getty.slice. Mar 17 19:05:09.696051 systemd[1]: Created slice system-modprobe.slice. Mar 17 19:05:09.696061 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 19:05:09.696074 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 19:05:09.696088 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 19:05:09.696098 systemd[1]: Created slice user.slice. Mar 17 19:05:09.696111 systemd[1]: Started systemd-ask-password-console.path. Mar 17 19:05:09.696123 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 19:05:09.696141 systemd[1]: Set up automount boot.automount. Mar 17 19:05:09.696153 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 19:05:09.696166 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 19:05:09.696176 systemd[1]: Stopped target initrd-fs.target. Mar 17 19:05:09.696188 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 19:05:09.696204 systemd[1]: Reached target integritysetup.target. Mar 17 19:05:09.696213 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 19:05:09.696226 systemd[1]: Reached target remote-fs.target. Mar 17 19:05:09.696238 systemd[1]: Reached target slices.target. Mar 17 19:05:09.696248 systemd[1]: Reached target swap.target. Mar 17 19:05:09.696258 systemd[1]: Reached target torcx.target. Mar 17 19:05:09.696270 systemd[1]: Reached target veritysetup.target. Mar 17 19:05:09.696285 systemd[1]: Listening on systemd-coredump.socket. Mar 17 19:05:09.696295 systemd[1]: Listening on systemd-initctl.socket. Mar 17 19:05:09.696307 systemd[1]: Listening on systemd-networkd.socket. Mar 17 19:05:09.696320 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 19:05:09.696329 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 19:05:09.696344 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 19:05:09.696357 systemd[1]: Mounting dev-hugepages.mount... Mar 17 19:05:09.696367 systemd[1]: Mounting dev-mqueue.mount... Mar 17 19:05:09.696380 systemd[1]: Mounting media.mount... Mar 17 19:05:09.696394 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:09.696404 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 19:05:09.696416 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 19:05:09.696429 systemd[1]: Mounting tmp.mount... Mar 17 19:05:09.696439 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 19:05:09.696455 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:05:09.696469 systemd[1]: Starting kmod-static-nodes.service... Mar 17 19:05:09.696479 systemd[1]: Starting modprobe@configfs.service... Mar 17 19:05:09.696491 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:05:09.696504 systemd[1]: Starting modprobe@drm.service... Mar 17 19:05:09.696514 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:05:09.696525 systemd[1]: Starting modprobe@fuse.service... Mar 17 19:05:09.696537 systemd[1]: Starting modprobe@loop.service... Mar 17 19:05:09.696549 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 19:05:09.696562 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 19:05:09.696574 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 19:05:09.696587 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 19:05:09.696596 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 19:05:09.696609 systemd[1]: Stopped systemd-journald.service. Mar 17 19:05:09.696622 systemd[1]: Starting systemd-journald.service... Mar 17 19:05:09.696632 systemd[1]: Starting systemd-modules-load.service... Mar 17 19:05:09.696646 systemd[1]: Starting systemd-network-generator.service... Mar 17 19:05:09.696661 kernel: loop: module loaded Mar 17 19:05:09.696670 systemd[1]: Starting systemd-remount-fs.service... Mar 17 19:05:09.696683 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 19:05:09.696697 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 19:05:09.696714 systemd[1]: Stopped verity-setup.service. Mar 17 19:05:09.696727 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:09.696739 systemd[1]: Mounted dev-hugepages.mount. Mar 17 19:05:09.696749 systemd[1]: Mounted dev-mqueue.mount. Mar 17 19:05:09.696761 systemd[1]: Mounted media.mount. Mar 17 19:05:09.696777 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 19:05:09.696787 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 19:05:09.696799 systemd[1]: Mounted tmp.mount. Mar 17 19:05:09.696812 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 19:05:09.696821 systemd[1]: Finished kmod-static-nodes.service. Mar 17 19:05:09.696835 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 19:05:09.696856 systemd[1]: Finished modprobe@configfs.service. Mar 17 19:05:09.696868 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:05:09.696879 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:05:09.696892 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 19:05:09.696902 systemd[1]: Finished modprobe@drm.service. Mar 17 19:05:09.696919 kernel: fuse: init (API version 7.34) Mar 17 19:05:09.696930 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:05:09.696941 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:05:09.696954 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 19:05:09.696966 systemd[1]: Finished modprobe@fuse.service. Mar 17 19:05:09.696977 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:05:09.696989 systemd[1]: Finished modprobe@loop.service. Mar 17 19:05:09.697003 systemd[1]: Finished systemd-network-generator.service. Mar 17 19:05:09.697019 systemd-journald[1145]: Journal started Mar 17 19:05:09.697066 systemd-journald[1145]: Runtime Journal (/run/log/journal/0885491a616d4b61a3e59ef7a6d202b3) is 8.0M, max 159.0M, 151.0M free. Mar 17 19:04:55.541000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 19:04:56.349000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 19:04:56.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:04:56.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 19:04:56.389000 audit: BPF prog-id=10 op=LOAD Mar 17 19:04:56.389000 audit: BPF prog-id=10 op=UNLOAD Mar 17 19:04:56.398000 audit: BPF prog-id=11 op=LOAD Mar 17 19:04:56.398000 audit: BPF prog-id=11 op=UNLOAD Mar 17 19:04:57.808000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 19:04:57.808000 audit[1060]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078cc a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:04:57.808000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 19:04:57.816000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 19:04:57.816000 audit[1060]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079a5 a2=1ed a3=0 items=2 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:04:57.816000 audit: CWD cwd="/" Mar 17 19:04:57.816000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:04:57.816000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:04:57.816000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 19:05:09.106000 audit: BPF prog-id=12 op=LOAD Mar 17 19:05:09.106000 audit: BPF prog-id=3 op=UNLOAD Mar 17 19:05:09.111000 audit: BPF prog-id=13 op=LOAD Mar 17 19:05:09.115000 audit: BPF prog-id=14 op=LOAD Mar 17 19:05:09.115000 audit: BPF prog-id=4 op=UNLOAD Mar 17 19:05:09.115000 audit: BPF prog-id=5 op=UNLOAD Mar 17 19:05:09.120000 audit: BPF prog-id=15 op=LOAD Mar 17 19:05:09.120000 audit: BPF prog-id=12 op=UNLOAD Mar 17 19:05:09.139000 audit: BPF prog-id=16 op=LOAD Mar 17 19:05:09.143000 audit: BPF prog-id=17 op=LOAD Mar 17 19:05:09.143000 audit: BPF prog-id=13 op=UNLOAD Mar 17 19:05:09.143000 audit: BPF prog-id=14 op=UNLOAD Mar 17 19:05:09.148000 audit: BPF prog-id=18 op=LOAD Mar 17 19:05:09.148000 audit: BPF prog-id=15 op=UNLOAD Mar 17 19:05:09.153000 audit: BPF prog-id=19 op=LOAD Mar 17 19:05:09.157000 audit: BPF prog-id=20 op=LOAD Mar 17 19:05:09.157000 audit: BPF prog-id=16 op=UNLOAD Mar 17 19:05:09.158000 audit: BPF prog-id=17 op=UNLOAD Mar 17 19:05:09.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.171000 audit: BPF prog-id=18 op=UNLOAD Mar 17 19:05:09.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.499000 audit: BPF prog-id=21 op=LOAD Mar 17 19:05:09.499000 audit: BPF prog-id=22 op=LOAD Mar 17 19:05:09.499000 audit: BPF prog-id=23 op=LOAD Mar 17 19:05:09.499000 audit: BPF prog-id=19 op=UNLOAD Mar 17 19:05:09.499000 audit: BPF prog-id=20 op=UNLOAD Mar 17 19:05:09.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.691000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 19:05:09.691000 audit[1145]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffc90bb0f0 a2=4000 a3=7fffc90bb18c items=0 ppid=1 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:05:09.691000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 19:05:09.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:04:57.749860 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:05:09.105398 systemd[1]: Queued start job for default target multi-user.target. Mar 17 19:04:57.761438 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 19:05:09.105413 systemd[1]: Unnecessary job was removed for dev-sda6.device. Mar 17 19:04:57.761465 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 19:05:09.159087 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 19:04:57.761510 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 19:04:57.761521 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 19:04:57.761582 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 19:04:57.761598 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 19:04:57.761893 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 19:04:57.761941 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 19:04:57.761956 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 19:04:57.787729 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 19:04:57.787829 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 19:04:57.787869 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 19:04:57.787887 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 19:04:57.787911 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 19:04:57.787937 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:04:57Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 19:05:07.644856 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:05:09.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:07.645111 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:05:07.645213 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:05:07.645387 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 19:05:07.645438 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 19:05:07.645497 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-03-17T19:05:07Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 19:05:09.706922 systemd[1]: Started systemd-journald.service. Mar 17 19:05:09.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.708132 systemd[1]: Finished systemd-remount-fs.service. Mar 17 19:05:09.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.710703 systemd[1]: Reached target network-pre.target. Mar 17 19:05:09.713791 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 19:05:09.717103 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 19:05:09.721804 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 19:05:09.736535 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 19:05:09.740042 systemd[1]: Starting systemd-journal-flush.service... Mar 17 19:05:09.742290 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:05:09.743673 systemd[1]: Starting systemd-random-seed.service... Mar 17 19:05:09.746255 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:05:09.747543 systemd[1]: Starting systemd-sysusers.service... Mar 17 19:05:09.752875 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 19:05:09.755266 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 19:05:09.759908 systemd[1]: Finished systemd-modules-load.service. Mar 17 19:05:09.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.763412 systemd[1]: Starting systemd-sysctl.service... Mar 17 19:05:09.838538 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 19:05:09.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.841598 systemd[1]: Finished systemd-random-seed.service. Mar 17 19:05:09.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.844217 systemd[1]: Reached target first-boot-complete.target. Mar 17 19:05:09.852003 systemd-journald[1145]: Time spent on flushing to /var/log/journal/0885491a616d4b61a3e59ef7a6d202b3 is 21.617ms for 1182 entries. Mar 17 19:05:09.852003 systemd-journald[1145]: System Journal (/var/log/journal/0885491a616d4b61a3e59ef7a6d202b3) is 8.0M, max 2.6G, 2.6G free. Mar 17 19:05:10.021291 systemd-journald[1145]: Received client request to flush runtime journal. Mar 17 19:05:09.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:09.848178 systemd[1]: Starting systemd-udev-settle.service... Mar 17 19:05:09.869498 systemd[1]: Finished systemd-sysctl.service. Mar 17 19:05:10.022015 udevadm[1184]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Mar 17 19:05:10.022819 systemd[1]: Finished systemd-journal-flush.service. Mar 17 19:05:10.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:10.601223 systemd[1]: Finished systemd-sysusers.service. Mar 17 19:05:10.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:10.605137 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 19:05:11.078623 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 19:05:11.082207 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 19:05:11.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:11.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:11.084000 audit: BPF prog-id=24 op=LOAD Mar 17 19:05:11.084000 audit: BPF prog-id=25 op=LOAD Mar 17 19:05:11.084000 audit: BPF prog-id=7 op=UNLOAD Mar 17 19:05:11.084000 audit: BPF prog-id=8 op=UNLOAD Mar 17 19:05:11.086379 systemd[1]: Starting systemd-udevd.service... Mar 17 19:05:11.104472 systemd-udevd[1188]: Using default interface naming scheme 'v252'. Mar 17 19:05:11.316878 systemd[1]: Started systemd-udevd.service. Mar 17 19:05:11.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:11.320000 audit: BPF prog-id=26 op=LOAD Mar 17 19:05:11.322389 systemd[1]: Starting systemd-networkd.service... Mar 17 19:05:11.359071 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 19:05:11.414733 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 19:05:11.426000 audit[1199]: AVC avc: denied { confidentiality } for pid=1199 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 19:05:11.454654 kernel: hv_vmbus: registering driver hyperv_fb Mar 17 19:05:11.454783 kernel: hv_vmbus: registering driver hv_balloon Mar 17 19:05:11.453000 audit: BPF prog-id=27 op=LOAD Mar 17 19:05:11.453000 audit: BPF prog-id=28 op=LOAD Mar 17 19:05:11.453000 audit: BPF prog-id=29 op=LOAD Mar 17 19:05:11.455892 systemd[1]: Starting systemd-userdbd.service... Mar 17 19:05:11.481059 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Mar 17 19:05:11.481162 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Mar 17 19:05:11.481187 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Mar 17 19:05:11.495199 kernel: hv_utils: Registering HyperV Utility Driver Mar 17 19:05:11.495299 kernel: hv_vmbus: registering driver hv_utils Mar 17 19:05:11.495348 kernel: Console: switching to colour dummy device 80x25 Mar 17 19:05:11.499729 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 19:05:11.426000 audit[1199]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c51acd6200 a1=f884 a2=7fd6f00ffbc5 a3=5 items=12 ppid=1188 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:05:11.426000 audit: CWD cwd="/" Mar 17 19:05:11.426000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=1 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=2 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=3 name=(null) inode=15476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=4 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=5 name=(null) inode=15477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=6 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=7 name=(null) inode=15478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=8 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=9 name=(null) inode=15479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=10 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PATH item=11 name=(null) inode=15480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:05:11.426000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 19:05:11.547112 systemd[1]: Started systemd-userdbd.service. Mar 17 19:05:11.548195 kernel: hv_utils: Heartbeat IC version 3.0 Mar 17 19:05:11.548271 kernel: hv_utils: Shutdown IC version 3.2 Mar 17 19:05:11.548302 kernel: hv_utils: TimeSync IC version 4.0 Mar 17 19:05:11.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.054956 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 19:05:12.070817 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Mar 17 19:05:12.137086 systemd[1]: Finished systemd-udev-settle.service. Mar 17 19:05:12.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.141292 systemd[1]: Starting lvm2-activation-early.service... Mar 17 19:05:12.207951 systemd-networkd[1194]: lo: Link UP Mar 17 19:05:12.208405 systemd-networkd[1194]: lo: Gained carrier Mar 17 19:05:12.209217 systemd-networkd[1194]: Enumeration completed Mar 17 19:05:12.209463 systemd[1]: Started systemd-networkd.service. Mar 17 19:05:12.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.213983 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 19:05:12.227099 systemd-networkd[1194]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 19:05:12.280682 kernel: mlx5_core 310a:00:02.0 enP12554s1: Link up Mar 17 19:05:12.301774 kernel: hv_netvsc 7c1e5236-51e2-7c1e-5236-51e27c1e5236 eth0: Data path switched to VF: enP12554s1 Mar 17 19:05:12.302143 systemd-networkd[1194]: enP12554s1: Link UP Mar 17 19:05:12.302330 systemd-networkd[1194]: eth0: Link UP Mar 17 19:05:12.302338 systemd-networkd[1194]: eth0: Gained carrier Mar 17 19:05:12.306052 systemd-networkd[1194]: enP12554s1: Gained carrier Mar 17 19:05:12.363811 systemd-networkd[1194]: eth0: DHCPv4 address 10.200.8.16/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 19:05:12.391345 lvm[1265]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 19:05:12.421919 systemd[1]: Finished lvm2-activation-early.service. Mar 17 19:05:12.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.424850 systemd[1]: Reached target cryptsetup.target. Mar 17 19:05:12.428321 systemd[1]: Starting lvm2-activation.service... Mar 17 19:05:12.434796 lvm[1267]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 19:05:12.464959 systemd[1]: Finished lvm2-activation.service. Mar 17 19:05:12.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.467590 systemd[1]: Reached target local-fs-pre.target. Mar 17 19:05:12.469890 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 19:05:12.469924 systemd[1]: Reached target local-fs.target. Mar 17 19:05:12.472280 systemd[1]: Reached target machines.target. Mar 17 19:05:12.475918 systemd[1]: Starting ldconfig.service... Mar 17 19:05:12.478451 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:05:12.478549 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:12.479891 systemd[1]: Starting systemd-boot-update.service... Mar 17 19:05:12.483315 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 19:05:12.487097 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 19:05:12.490640 systemd[1]: Starting systemd-sysext.service... Mar 17 19:05:12.569816 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 19:05:12.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:12.768958 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1269 (bootctl) Mar 17 19:05:12.771288 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 19:05:12.923262 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 19:05:13.007348 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 19:05:13.007596 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 19:05:13.075684 kernel: loop0: detected capacity change from 0 to 205544 Mar 17 19:05:13.148399 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 19:05:13.149127 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 19:05:13.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.181679 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 19:05:13.200678 kernel: loop1: detected capacity change from 0 to 205544 Mar 17 19:05:13.206216 (sd-sysext)[1281]: Using extensions 'kubernetes'. Mar 17 19:05:13.206705 (sd-sysext)[1281]: Merged extensions into '/usr'. Mar 17 19:05:13.223599 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.225323 systemd[1]: Mounting usr-share-oem.mount... Mar 17 19:05:13.227957 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.231811 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:05:13.234284 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:05:13.236719 systemd[1]: Starting modprobe@loop.service... Mar 17 19:05:13.237738 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.237922 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:13.238085 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.241613 systemd[1]: Mounted usr-share-oem.mount. Mar 17 19:05:13.243053 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:05:13.244760 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:05:13.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.247735 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:05:13.247889 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:05:13.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.250529 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:05:13.250696 systemd[1]: Finished modprobe@loop.service. Mar 17 19:05:13.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.253227 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:05:13.253380 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.254615 systemd[1]: Finished systemd-sysext.service. Mar 17 19:05:13.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.258533 systemd[1]: Starting ensure-sysext.service... Mar 17 19:05:13.262258 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 19:05:13.271471 systemd[1]: Reloading. Mar 17 19:05:13.291364 systemd-tmpfiles[1288]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 19:05:13.323261 systemd-tmpfiles[1288]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 19:05:13.337028 systemd-tmpfiles[1288]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 19:05:13.337601 /usr/lib/systemd/system-generators/torcx-generator[1308]: time="2025-03-17T19:05:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:05:13.338021 /usr/lib/systemd/system-generators/torcx-generator[1308]: time="2025-03-17T19:05:13Z" level=info msg="torcx already run" Mar 17 19:05:13.437808 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:05:13.437829 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:05:13.454352 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:05:13.520000 audit: BPF prog-id=30 op=LOAD Mar 17 19:05:13.520000 audit: BPF prog-id=21 op=UNLOAD Mar 17 19:05:13.520000 audit: BPF prog-id=31 op=LOAD Mar 17 19:05:13.520000 audit: BPF prog-id=32 op=LOAD Mar 17 19:05:13.520000 audit: BPF prog-id=22 op=UNLOAD Mar 17 19:05:13.520000 audit: BPF prog-id=23 op=UNLOAD Mar 17 19:05:13.521000 audit: BPF prog-id=33 op=LOAD Mar 17 19:05:13.521000 audit: BPF prog-id=27 op=UNLOAD Mar 17 19:05:13.521000 audit: BPF prog-id=34 op=LOAD Mar 17 19:05:13.522000 audit: BPF prog-id=35 op=LOAD Mar 17 19:05:13.522000 audit: BPF prog-id=28 op=UNLOAD Mar 17 19:05:13.522000 audit: BPF prog-id=29 op=UNLOAD Mar 17 19:05:13.522000 audit: BPF prog-id=36 op=LOAD Mar 17 19:05:13.522000 audit: BPF prog-id=37 op=LOAD Mar 17 19:05:13.522000 audit: BPF prog-id=24 op=UNLOAD Mar 17 19:05:13.522000 audit: BPF prog-id=25 op=UNLOAD Mar 17 19:05:13.524000 audit: BPF prog-id=38 op=LOAD Mar 17 19:05:13.524000 audit: BPF prog-id=26 op=UNLOAD Mar 17 19:05:13.540383 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.541043 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.542834 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 19:05:13.545701 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:05:13.549773 systemd[1]: Starting modprobe@loop.service... Mar 17 19:05:13.551325 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.551536 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:13.551821 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.553382 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:05:13.553581 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:05:13.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.554973 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:05:13.555095 systemd[1]: Finished modprobe@loop.service. Mar 17 19:05:13.560011 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 19:05:13.560159 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 19:05:13.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.561616 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.561907 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.563414 systemd[1]: Starting modprobe@drm.service... Mar 17 19:05:13.566148 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 19:05:13.569313 systemd[1]: Starting modprobe@loop.service... Mar 17 19:05:13.570582 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.570788 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:13.571037 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 19:05:13.572696 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 19:05:13.572890 systemd[1]: Finished modprobe@drm.service. Mar 17 19:05:13.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.575633 systemd[1]: Finished ensure-sysext.service. Mar 17 19:05:13.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.579408 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 19:05:13.579555 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 19:05:13.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.580990 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 19:05:13.581102 systemd[1]: Finished modprobe@loop.service. Mar 17 19:05:13.581303 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 19:05:13.581335 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 19:05:13.671817 systemd-networkd[1194]: eth0: Gained IPv6LL Mar 17 19:05:13.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.677543 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 19:05:13.790830 systemd-fsck[1277]: fsck.fat 4.2 (2021-01-31) Mar 17 19:05:13.790830 systemd-fsck[1277]: /dev/sda1: 789 files, 119299/258078 clusters Mar 17 19:05:13.792812 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 19:05:13.798419 systemd[1]: Mounting boot.mount... Mar 17 19:05:13.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.811551 systemd[1]: Mounted boot.mount. Mar 17 19:05:13.826130 systemd[1]: Finished systemd-boot-update.service. Mar 17 19:05:13.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.956835 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 19:05:13.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:13.961093 systemd[1]: Starting audit-rules.service... Mar 17 19:05:13.964616 systemd[1]: Starting clean-ca-certificates.service... Mar 17 19:05:13.968456 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 19:05:13.971000 audit: BPF prog-id=39 op=LOAD Mar 17 19:05:13.973815 systemd[1]: Starting systemd-resolved.service... Mar 17 19:05:13.979000 audit: BPF prog-id=40 op=LOAD Mar 17 19:05:13.981552 systemd[1]: Starting systemd-timesyncd.service... Mar 17 19:05:13.984785 systemd[1]: Starting systemd-update-utmp.service... Mar 17 19:05:14.022000 audit[1388]: SYSTEM_BOOT pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.027541 systemd[1]: Finished systemd-update-utmp.service. Mar 17 19:05:14.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.044360 systemd[1]: Finished clean-ca-certificates.service. Mar 17 19:05:14.047128 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 19:05:14.091690 systemd[1]: Started systemd-timesyncd.service. Mar 17 19:05:14.094586 systemd[1]: Reached target time-set.target. Mar 17 19:05:14.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.191843 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 19:05:14.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.208758 systemd-resolved[1385]: Positive Trust Anchors: Mar 17 19:05:14.208775 systemd-resolved[1385]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 19:05:14.208817 systemd-resolved[1385]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 19:05:14.271900 systemd-resolved[1385]: Using system hostname 'ci-3510.3.7-a-9eb0e2b4dd'. Mar 17 19:05:14.273683 systemd[1]: Started systemd-resolved.service. Mar 17 19:05:14.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:05:14.276247 systemd[1]: Reached target network.target. Mar 17 19:05:14.278465 systemd[1]: Reached target network-online.target. Mar 17 19:05:14.280663 systemd[1]: Reached target nss-lookup.target. Mar 17 19:05:14.342452 systemd-timesyncd[1387]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). Mar 17 19:05:14.342681 systemd-timesyncd[1387]: Initial clock synchronization to Mon 2025-03-17 19:05:14.341486 UTC. Mar 17 19:05:14.492825 kernel: kauditd_printk_skb: 132 callbacks suppressed Mar 17 19:05:14.492954 kernel: audit: type=1305 audit(1742238314.489:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 19:05:14.489000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 19:05:14.490688 systemd[1]: Finished audit-rules.service. Mar 17 19:05:14.493287 augenrules[1403]: No rules Mar 17 19:05:14.489000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1a697080 a2=420 a3=0 items=0 ppid=1382 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:05:14.514944 kernel: audit: type=1300 audit(1742238314.489:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1a697080 a2=420 a3=0 items=0 ppid=1382 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:05:14.514995 kernel: audit: type=1327 audit(1742238314.489:217): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 19:05:14.489000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 19:05:20.574483 ldconfig[1268]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 19:05:20.588296 systemd[1]: Finished ldconfig.service. Mar 17 19:05:20.592223 systemd[1]: Starting systemd-update-done.service... Mar 17 19:05:20.601274 systemd[1]: Finished systemd-update-done.service. Mar 17 19:05:20.604000 systemd[1]: Reached target sysinit.target. Mar 17 19:05:20.606244 systemd[1]: Started motdgen.path. Mar 17 19:05:20.608148 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 19:05:20.614068 systemd[1]: Started logrotate.timer. Mar 17 19:05:20.616269 systemd[1]: Started mdadm.timer. Mar 17 19:05:20.618097 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 19:05:20.620477 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 19:05:20.620525 systemd[1]: Reached target paths.target. Mar 17 19:05:20.622557 systemd[1]: Reached target timers.target. Mar 17 19:05:20.625131 systemd[1]: Listening on dbus.socket. Mar 17 19:05:20.628175 systemd[1]: Starting docker.socket... Mar 17 19:05:20.667152 systemd[1]: Listening on sshd.socket. Mar 17 19:05:20.669633 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:20.670319 systemd[1]: Listening on docker.socket. Mar 17 19:05:20.672581 systemd[1]: Reached target sockets.target. Mar 17 19:05:20.674739 systemd[1]: Reached target basic.target. Mar 17 19:05:20.677036 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 19:05:20.677076 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 19:05:20.678353 systemd[1]: Starting containerd.service... Mar 17 19:05:20.681364 systemd[1]: Starting dbus.service... Mar 17 19:05:20.684588 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 19:05:20.687831 systemd[1]: Starting extend-filesystems.service... Mar 17 19:05:20.690142 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 19:05:20.693162 systemd[1]: Starting kubelet.service... Mar 17 19:05:20.697175 systemd[1]: Starting motdgen.service... Mar 17 19:05:20.700289 systemd[1]: Started nvidia.service. Mar 17 19:05:20.704298 systemd[1]: Starting prepare-helm.service... Mar 17 19:05:20.707580 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 19:05:20.711438 systemd[1]: Starting sshd-keygen.service... Mar 17 19:05:20.717722 systemd[1]: Starting systemd-logind.service... Mar 17 19:05:20.719888 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 19:05:20.720009 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 19:05:20.722970 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 19:05:20.724028 systemd[1]: Starting update-engine.service... Mar 17 19:05:20.727718 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 19:05:20.742966 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 19:05:20.743228 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 19:05:20.784222 jq[1428]: true Mar 17 19:05:20.784545 jq[1413]: false Mar 17 19:05:20.785143 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 19:05:20.785385 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 19:05:20.802126 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 19:05:20.802312 systemd[1]: Finished motdgen.service. Mar 17 19:05:20.809337 extend-filesystems[1414]: Found loop1 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda1 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda2 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda3 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found usr Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda4 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda6 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda7 Mar 17 19:05:20.811462 extend-filesystems[1414]: Found sda9 Mar 17 19:05:20.811462 extend-filesystems[1414]: Checking size of /dev/sda9 Mar 17 19:05:20.849374 env[1440]: time="2025-03-17T19:05:20.849260816Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 19:05:20.869201 jq[1436]: true Mar 17 19:05:20.886668 tar[1432]: linux-amd64/helm Mar 17 19:05:20.900906 extend-filesystems[1414]: Old size kept for /dev/sda9 Mar 17 19:05:20.900906 extend-filesystems[1414]: Found sr0 Mar 17 19:05:20.901522 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 19:05:20.901708 systemd[1]: Finished extend-filesystems.service. Mar 17 19:05:20.919691 systemd-logind[1424]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 19:05:20.928061 env[1440]: time="2025-03-17T19:05:20.928008036Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 19:05:20.928748 env[1440]: time="2025-03-17T19:05:20.928711610Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.928859 systemd-logind[1424]: New seat seat0. Mar 17 19:05:20.933414 env[1440]: time="2025-03-17T19:05:20.933375033Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:05:20.938133 env[1440]: time="2025-03-17T19:05:20.938106754Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.938603 env[1440]: time="2025-03-17T19:05:20.938572737Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:05:20.938734 env[1440]: time="2025-03-17T19:05:20.938717131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.938982 env[1440]: time="2025-03-17T19:05:20.938956722Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 19:05:20.939095 env[1440]: time="2025-03-17T19:05:20.939078617Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.939285 env[1440]: time="2025-03-17T19:05:20.939267210Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.940650 env[1440]: time="2025-03-17T19:05:20.940625559Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 19:05:20.941037 env[1440]: time="2025-03-17T19:05:20.941010344Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 19:05:20.942064 env[1440]: time="2025-03-17T19:05:20.942041905Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 19:05:20.942254 env[1440]: time="2025-03-17T19:05:20.942232798Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 19:05:20.942349 env[1440]: time="2025-03-17T19:05:20.942335794Z" level=info msg="metadata content store policy set" policy=shared Mar 17 19:05:21.031702 env[1440]: time="2025-03-17T19:05:21.031563291Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 19:05:21.031702 env[1440]: time="2025-03-17T19:05:21.031636189Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.031940478Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032007275Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032033275Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032052574Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032068473Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032085173Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032103072Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032127871Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032146371Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032167070Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032339464Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032448560Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032799647Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 19:05:21.034063 env[1440]: time="2025-03-17T19:05:21.032851546Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.032873745Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.032945342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.032964842Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.032985041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033052838Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033134036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033169534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033188234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033206433Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033240732Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033449024Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033489823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033511122Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.036648 env[1440]: time="2025-03-17T19:05:21.033529821Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 19:05:21.037201 env[1440]: time="2025-03-17T19:05:21.033564520Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 19:05:21.037201 env[1440]: time="2025-03-17T19:05:21.033584920Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 19:05:21.037201 env[1440]: time="2025-03-17T19:05:21.033628318Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 19:05:21.037201 env[1440]: time="2025-03-17T19:05:21.033687816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 19:05:21.037397 env[1440]: time="2025-03-17T19:05:21.033989805Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 19:05:21.037397 env[1440]: time="2025-03-17T19:05:21.034720479Z" level=info msg="Connect containerd service" Mar 17 19:05:21.037397 env[1440]: time="2025-03-17T19:05:21.034791077Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039349015Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039470511Z" level=info msg="Start subscribing containerd event" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039530609Z" level=info msg="Start recovering state" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039605906Z" level=info msg="Start event monitor" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039627605Z" level=info msg="Start snapshots syncer" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039639605Z" level=info msg="Start cni network conf syncer for default" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.039649804Z" level=info msg="Start streaming server" Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.040171086Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.040262883Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 19:05:21.091506 env[1440]: time="2025-03-17T19:05:21.068038497Z" level=info msg="containerd successfully booted in 0.220025s" Mar 17 19:05:21.064514 systemd[1]: Started containerd.service. Mar 17 19:05:21.141907 dbus-daemon[1412]: [system] SELinux support is enabled Mar 17 19:05:21.142130 systemd[1]: Started dbus.service. Mar 17 19:05:21.147517 dbus-daemon[1412]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 17 19:05:21.146932 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 19:05:21.146968 systemd[1]: Reached target system-config.target. Mar 17 19:05:21.149333 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 19:05:21.149357 systemd[1]: Reached target user-config.target. Mar 17 19:05:21.151963 systemd[1]: Started systemd-logind.service. Mar 17 19:05:21.176061 bash[1483]: Updated "/home/core/.ssh/authorized_keys" Mar 17 19:05:21.171221 systemd[1]: nvidia.service: Deactivated successfully. Mar 17 19:05:21.171975 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 19:05:21.713256 tar[1432]: linux-amd64/LICENSE Mar 17 19:05:21.713256 tar[1432]: linux-amd64/README.md Mar 17 19:05:21.719800 systemd[1]: Finished prepare-helm.service. Mar 17 19:05:21.777757 update_engine[1427]: I0317 19:05:21.776865 1427 main.cc:92] Flatcar Update Engine starting Mar 17 19:05:21.837566 systemd[1]: Started update-engine.service. Mar 17 19:05:21.839977 update_engine[1427]: I0317 19:05:21.839099 1427 update_check_scheduler.cc:74] Next update check in 8m27s Mar 17 19:05:21.843021 systemd[1]: Started locksmithd.service. Mar 17 19:05:22.183264 systemd[1]: Started kubelet.service. Mar 17 19:05:22.952825 kubelet[1519]: E0317 19:05:22.952771 1519 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:05:22.955124 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:05:22.955304 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:05:22.955619 systemd[1]: kubelet.service: Consumed 1.089s CPU time. Mar 17 19:05:23.043212 sshd_keygen[1429]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 19:05:23.064750 systemd[1]: Finished sshd-keygen.service. Mar 17 19:05:23.069183 systemd[1]: Starting issuegen.service... Mar 17 19:05:23.073067 systemd[1]: Started waagent.service. Mar 17 19:05:23.080041 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 19:05:23.080249 systemd[1]: Finished issuegen.service. Mar 17 19:05:23.084057 systemd[1]: Starting systemd-user-sessions.service... Mar 17 19:05:23.103063 systemd[1]: Finished systemd-user-sessions.service. Mar 17 19:05:23.107811 systemd[1]: Started getty@tty1.service. Mar 17 19:05:23.112212 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 19:05:23.114922 systemd[1]: Reached target getty.target. Mar 17 19:05:23.116967 systemd[1]: Reached target multi-user.target. Mar 17 19:05:23.120998 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 19:05:23.132643 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 19:05:23.132873 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 19:05:23.135732 systemd[1]: Startup finished in 849ms (firmware) + 25.594s (loader) + 940ms (kernel) + 14.183s (initrd) + 27.915s (userspace) = 1min 9.484s. Mar 17 19:05:23.224026 locksmithd[1516]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 19:05:23.657712 login[1542]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Mar 17 19:05:23.660096 login[1543]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 19:05:23.707650 systemd[1]: Created slice user-500.slice. Mar 17 19:05:23.709301 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 19:05:23.712721 systemd-logind[1424]: New session 2 of user core. Mar 17 19:05:23.720402 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 19:05:23.722696 systemd[1]: Starting user@500.service... Mar 17 19:05:23.726454 (systemd)[1546]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:05:23.846557 systemd[1546]: Queued start job for default target default.target. Mar 17 19:05:23.847240 systemd[1546]: Reached target paths.target. Mar 17 19:05:23.847272 systemd[1546]: Reached target sockets.target. Mar 17 19:05:23.847288 systemd[1546]: Reached target timers.target. Mar 17 19:05:23.847304 systemd[1546]: Reached target basic.target. Mar 17 19:05:23.847449 systemd[1]: Started user@500.service. Mar 17 19:05:23.848801 systemd[1]: Started session-2.scope. Mar 17 19:05:23.849418 systemd[1546]: Reached target default.target. Mar 17 19:05:23.849620 systemd[1546]: Startup finished in 116ms. Mar 17 19:05:24.658310 login[1542]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 19:05:24.664803 systemd[1]: Started session-1.scope. Mar 17 19:05:24.665447 systemd-logind[1424]: New session 1 of user core. Mar 17 19:05:29.145393 waagent[1537]: 2025-03-17T19:05:29.145265Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Mar 17 19:05:29.149747 waagent[1537]: 2025-03-17T19:05:29.149645Z INFO Daemon Daemon OS: flatcar 3510.3.7 Mar 17 19:05:29.152568 waagent[1537]: 2025-03-17T19:05:29.152495Z INFO Daemon Daemon Python: 3.9.16 Mar 17 19:05:29.155251 waagent[1537]: 2025-03-17T19:05:29.155175Z INFO Daemon Daemon Run daemon Mar 17 19:05:29.157575 waagent[1537]: 2025-03-17T19:05:29.157505Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' Mar 17 19:05:29.171368 waagent[1537]: 2025-03-17T19:05:29.171223Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 19:05:29.178688 waagent[1537]: 2025-03-17T19:05:29.178522Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.179142Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.180236Z INFO Daemon Daemon Using waagent for provisioning Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.181763Z INFO Daemon Daemon Activate resource disk Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.182439Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.190258Z INFO Daemon Daemon Found device: None Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.191207Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.192035Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.193924Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.194789Z INFO Daemon Daemon Running default provisioning handler Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.205267Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.208620Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.209745Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 19:05:29.224613 waagent[1537]: 2025-03-17T19:05:29.210611Z INFO Daemon Daemon Copying ovf-env.xml Mar 17 19:05:29.232229 waagent[1537]: 2025-03-17T19:05:29.232057Z INFO Daemon Daemon Successfully mounted dvd Mar 17 19:05:29.319823 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Mar 17 19:05:29.367548 waagent[1537]: 2025-03-17T19:05:29.367381Z INFO Daemon Daemon Detect protocol endpoint Mar 17 19:05:29.370725 waagent[1537]: 2025-03-17T19:05:29.370604Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 19:05:29.373840 waagent[1537]: 2025-03-17T19:05:29.373752Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Mar 17 19:05:29.377261 waagent[1537]: 2025-03-17T19:05:29.377181Z INFO Daemon Daemon Test for route to 168.63.129.16 Mar 17 19:05:29.380190 waagent[1537]: 2025-03-17T19:05:29.380115Z INFO Daemon Daemon Route to 168.63.129.16 exists Mar 17 19:05:29.382943 waagent[1537]: 2025-03-17T19:05:29.382870Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Mar 17 19:05:29.477108 waagent[1537]: 2025-03-17T19:05:29.476949Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Mar 17 19:05:29.484919 waagent[1537]: 2025-03-17T19:05:29.477942Z INFO Daemon Daemon Wire protocol version:2012-11-30 Mar 17 19:05:29.484919 waagent[1537]: 2025-03-17T19:05:29.478805Z INFO Daemon Daemon Server preferred version:2015-04-05 Mar 17 19:05:29.922541 waagent[1537]: 2025-03-17T19:05:29.922370Z INFO Daemon Daemon Initializing goal state during protocol detection Mar 17 19:05:29.934966 waagent[1537]: 2025-03-17T19:05:29.934871Z INFO Daemon Daemon Forcing an update of the goal state.. Mar 17 19:05:29.940432 waagent[1537]: 2025-03-17T19:05:29.935444Z INFO Daemon Daemon Fetching goal state [incarnation 1] Mar 17 19:05:30.035959 waagent[1537]: 2025-03-17T19:05:30.035812Z INFO Daemon Daemon Found private key matching thumbprint 2EB5EF1CC78E0781F633DD5620C4989DB01432E8 Mar 17 19:05:30.041030 waagent[1537]: 2025-03-17T19:05:30.040938Z INFO Daemon Daemon Certificate with thumbprint 18C6D82936228DD97712C3686D1AD1B980E9A747 has no matching private key. Mar 17 19:05:30.045919 waagent[1537]: 2025-03-17T19:05:30.045840Z INFO Daemon Daemon Fetch goal state completed Mar 17 19:05:30.111639 waagent[1537]: 2025-03-17T19:05:30.111532Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: dd2c59e7-dbd9-4b5b-99ca-4bca3f8c3e15 New eTag: 16955040590698051723] Mar 17 19:05:30.117985 waagent[1537]: 2025-03-17T19:05:30.117884Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 19:05:30.131253 waagent[1537]: 2025-03-17T19:05:30.131170Z INFO Daemon Daemon Starting provisioning Mar 17 19:05:30.134264 waagent[1537]: 2025-03-17T19:05:30.134165Z INFO Daemon Daemon Handle ovf-env.xml. Mar 17 19:05:30.136873 waagent[1537]: 2025-03-17T19:05:30.136796Z INFO Daemon Daemon Set hostname [ci-3510.3.7-a-9eb0e2b4dd] Mar 17 19:05:30.159304 waagent[1537]: 2025-03-17T19:05:30.159121Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-a-9eb0e2b4dd] Mar 17 19:05:30.163770 waagent[1537]: 2025-03-17T19:05:30.163629Z INFO Daemon Daemon Examine /proc/net/route for primary interface Mar 17 19:05:30.167341 waagent[1537]: 2025-03-17T19:05:30.167257Z INFO Daemon Daemon Primary interface is [eth0] Mar 17 19:05:30.182337 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Mar 17 19:05:30.182599 systemd[1]: Stopped systemd-networkd-wait-online.service. Mar 17 19:05:30.182698 systemd[1]: Stopping systemd-networkd-wait-online.service... Mar 17 19:05:30.183052 systemd[1]: Stopping systemd-networkd.service... Mar 17 19:05:30.188702 systemd-networkd[1194]: eth0: DHCPv6 lease lost Mar 17 19:05:30.190226 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 19:05:30.190437 systemd[1]: Stopped systemd-networkd.service. Mar 17 19:05:30.193114 systemd[1]: Starting systemd-networkd.service... Mar 17 19:05:30.225534 systemd-networkd[1590]: enP12554s1: Link UP Mar 17 19:05:30.225547 systemd-networkd[1590]: enP12554s1: Gained carrier Mar 17 19:05:30.227201 systemd-networkd[1590]: eth0: Link UP Mar 17 19:05:30.227210 systemd-networkd[1590]: eth0: Gained carrier Mar 17 19:05:30.227649 systemd-networkd[1590]: lo: Link UP Mar 17 19:05:30.227737 systemd-networkd[1590]: lo: Gained carrier Mar 17 19:05:30.228048 systemd-networkd[1590]: eth0: Gained IPv6LL Mar 17 19:05:30.228350 systemd-networkd[1590]: Enumeration completed Mar 17 19:05:30.228492 systemd[1]: Started systemd-networkd.service. Mar 17 19:05:30.231268 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 19:05:30.233114 waagent[1537]: 2025-03-17T19:05:30.231223Z INFO Daemon Daemon Create user account if not exists Mar 17 19:05:30.234471 systemd-networkd[1590]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 19:05:30.239377 waagent[1537]: 2025-03-17T19:05:30.239268Z INFO Daemon Daemon User core already exists, skip useradd Mar 17 19:05:30.244449 waagent[1537]: 2025-03-17T19:05:30.244327Z INFO Daemon Daemon Configure sudoer Mar 17 19:05:30.248142 waagent[1537]: 2025-03-17T19:05:30.248052Z INFO Daemon Daemon Configure sshd Mar 17 19:05:30.250638 waagent[1537]: 2025-03-17T19:05:30.250559Z INFO Daemon Daemon Deploy ssh public key. Mar 17 19:05:30.274776 systemd-networkd[1590]: eth0: DHCPv4 address 10.200.8.16/24, gateway 10.200.8.1 acquired from 168.63.129.16 Mar 17 19:05:30.281231 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 19:05:30.344173 waagent[1537]: 2025-03-17T19:05:30.344031Z INFO Daemon Daemon Decode custom data Mar 17 19:05:30.348934 waagent[1537]: 2025-03-17T19:05:30.344830Z INFO Daemon Daemon Save custom data Mar 17 19:05:31.408059 waagent[1537]: 2025-03-17T19:05:31.407959Z INFO Daemon Daemon Provisioning complete Mar 17 19:05:31.424044 waagent[1537]: 2025-03-17T19:05:31.423951Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Mar 17 19:05:31.427614 waagent[1537]: 2025-03-17T19:05:31.427507Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Mar 17 19:05:31.433689 waagent[1537]: 2025-03-17T19:05:31.433570Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Mar 17 19:05:31.714761 waagent[1599]: 2025-03-17T19:05:31.714551Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Mar 17 19:05:31.715550 waagent[1599]: 2025-03-17T19:05:31.715476Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:31.715725 waagent[1599]: 2025-03-17T19:05:31.715650Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:31.727632 waagent[1599]: 2025-03-17T19:05:31.727537Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Mar 17 19:05:31.727841 waagent[1599]: 2025-03-17T19:05:31.727779Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Mar 17 19:05:31.794511 waagent[1599]: 2025-03-17T19:05:31.794363Z INFO ExtHandler ExtHandler Found private key matching thumbprint 2EB5EF1CC78E0781F633DD5620C4989DB01432E8 Mar 17 19:05:31.794816 waagent[1599]: 2025-03-17T19:05:31.794748Z INFO ExtHandler ExtHandler Certificate with thumbprint 18C6D82936228DD97712C3686D1AD1B980E9A747 has no matching private key. Mar 17 19:05:31.795069 waagent[1599]: 2025-03-17T19:05:31.795018Z INFO ExtHandler ExtHandler Fetch goal state completed Mar 17 19:05:31.809901 waagent[1599]: 2025-03-17T19:05:31.809829Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: c44b1a8f-5ea5-4417-a134-41c130e9ee9a New eTag: 16955040590698051723] Mar 17 19:05:31.810518 waagent[1599]: 2025-03-17T19:05:31.810454Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 19:05:31.987775 waagent[1599]: 2025-03-17T19:05:31.987500Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 19:05:32.016482 waagent[1599]: 2025-03-17T19:05:32.016362Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1599 Mar 17 19:05:32.020174 waagent[1599]: 2025-03-17T19:05:32.020088Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 19:05:32.021480 waagent[1599]: 2025-03-17T19:05:32.021412Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 19:05:32.120622 waagent[1599]: 2025-03-17T19:05:32.120546Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 19:05:32.123114 waagent[1599]: 2025-03-17T19:05:32.123027Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 19:05:32.132064 waagent[1599]: 2025-03-17T19:05:32.131994Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 19:05:32.132628 waagent[1599]: 2025-03-17T19:05:32.132560Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 19:05:32.133849 waagent[1599]: 2025-03-17T19:05:32.133775Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Mar 17 19:05:32.135284 waagent[1599]: 2025-03-17T19:05:32.135220Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 19:05:32.135940 waagent[1599]: 2025-03-17T19:05:32.135881Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 19:05:32.136402 waagent[1599]: 2025-03-17T19:05:32.136345Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:32.136525 waagent[1599]: 2025-03-17T19:05:32.136449Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:32.137001 waagent[1599]: 2025-03-17T19:05:32.136937Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 19:05:32.137189 waagent[1599]: 2025-03-17T19:05:32.137119Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:32.137333 waagent[1599]: 2025-03-17T19:05:32.137270Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:32.137744 waagent[1599]: 2025-03-17T19:05:32.137677Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 19:05:32.138252 waagent[1599]: 2025-03-17T19:05:32.138192Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 19:05:32.138720 waagent[1599]: 2025-03-17T19:05:32.138643Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 19:05:32.138921 waagent[1599]: 2025-03-17T19:05:32.138862Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 19:05:32.139418 waagent[1599]: 2025-03-17T19:05:32.139364Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 19:05:32.139764 waagent[1599]: 2025-03-17T19:05:32.139707Z INFO EnvHandler ExtHandler Configure routes Mar 17 19:05:32.141059 waagent[1599]: 2025-03-17T19:05:32.141005Z INFO EnvHandler ExtHandler Gateway:None Mar 17 19:05:32.141277 waagent[1599]: 2025-03-17T19:05:32.141220Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 19:05:32.141277 waagent[1599]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 19:05:32.141277 waagent[1599]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 19:05:32.141277 waagent[1599]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 19:05:32.141277 waagent[1599]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:32.141277 waagent[1599]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:32.141277 waagent[1599]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:32.145019 waagent[1599]: 2025-03-17T19:05:32.144758Z INFO EnvHandler ExtHandler Routes:None Mar 17 19:05:32.158195 waagent[1599]: 2025-03-17T19:05:32.158095Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Mar 17 19:05:32.158846 waagent[1599]: 2025-03-17T19:05:32.158789Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 19:05:32.159741 waagent[1599]: 2025-03-17T19:05:32.159681Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Mar 17 19:05:32.195212 waagent[1599]: 2025-03-17T19:05:32.195105Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Mar 17 19:05:32.214039 waagent[1599]: 2025-03-17T19:05:32.213904Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1590' Mar 17 19:05:32.383521 waagent[1599]: 2025-03-17T19:05:32.381221Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Mar 17 19:05:32.436981 waagent[1537]: 2025-03-17T19:05:32.436840Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Mar 17 19:05:32.440554 waagent[1537]: 2025-03-17T19:05:32.440493Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Mar 17 19:05:33.050163 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 19:05:33.050457 systemd[1]: Stopped kubelet.service. Mar 17 19:05:33.050517 systemd[1]: kubelet.service: Consumed 1.089s CPU time. Mar 17 19:05:33.052608 systemd[1]: Starting kubelet.service... Mar 17 19:05:33.176717 systemd[1]: Started kubelet.service. Mar 17 19:05:33.636263 waagent[1626]: 2025-03-17T19:05:33.636144Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Mar 17 19:05:33.637044 waagent[1626]: 2025-03-17T19:05:33.636977Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 Mar 17 19:05:33.637192 waagent[1626]: 2025-03-17T19:05:33.637136Z INFO ExtHandler ExtHandler Python: 3.9.16 Mar 17 19:05:33.637342 waagent[1626]: 2025-03-17T19:05:33.637295Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Mar 17 19:05:33.647339 waagent[1626]: 2025-03-17T19:05:33.647214Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 19:05:33.647795 waagent[1626]: 2025-03-17T19:05:33.647729Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:33.647965 waagent[1626]: 2025-03-17T19:05:33.647915Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:33.660966 waagent[1626]: 2025-03-17T19:05:33.660876Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Mar 17 19:05:33.670676 waagent[1626]: 2025-03-17T19:05:33.670602Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 Mar 17 19:05:33.671748 waagent[1626]: 2025-03-17T19:05:33.671682Z INFO ExtHandler Mar 17 19:05:33.671920 waagent[1626]: 2025-03-17T19:05:33.671863Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ee722971-e8af-4a15-be10-751fe2f29069 eTag: 16955040590698051723 source: Fabric] Mar 17 19:05:33.672673 waagent[1626]: 2025-03-17T19:05:33.672598Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 19:05:33.756202 waagent[1626]: 2025-03-17T19:05:33.756000Z INFO ExtHandler Mar 17 19:05:33.756552 waagent[1626]: 2025-03-17T19:05:33.756451Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Mar 17 19:05:33.768263 waagent[1626]: 2025-03-17T19:05:33.768192Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 19:05:33.768916 waagent[1626]: 2025-03-17T19:05:33.768854Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 19:05:33.779310 kubelet[1635]: E0317 19:05:33.779255 1635 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:05:33.782188 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:05:33.782311 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:05:33.799868 waagent[1626]: 2025-03-17T19:05:33.799794Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Mar 17 19:05:33.878105 waagent[1626]: 2025-03-17T19:05:33.877954Z INFO ExtHandler Downloaded certificate {'thumbprint': '2EB5EF1CC78E0781F633DD5620C4989DB01432E8', 'hasPrivateKey': True} Mar 17 19:05:33.879162 waagent[1626]: 2025-03-17T19:05:33.879088Z INFO ExtHandler Downloaded certificate {'thumbprint': '18C6D82936228DD97712C3686D1AD1B980E9A747', 'hasPrivateKey': False} Mar 17 19:05:33.880146 waagent[1626]: 2025-03-17T19:05:33.880082Z INFO ExtHandler Fetch goal state completed Mar 17 19:05:33.897847 waagent[1626]: 2025-03-17T19:05:33.897674Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Mar 17 19:05:33.909939 waagent[1626]: 2025-03-17T19:05:33.909829Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1626 Mar 17 19:05:33.913089 waagent[1626]: 2025-03-17T19:05:33.913000Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 19:05:33.914184 waagent[1626]: 2025-03-17T19:05:33.914118Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Mar 17 19:05:33.914500 waagent[1626]: 2025-03-17T19:05:33.914440Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Mar 17 19:05:33.916481 waagent[1626]: 2025-03-17T19:05:33.916421Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 19:05:33.921779 waagent[1626]: 2025-03-17T19:05:33.921721Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 19:05:33.922149 waagent[1626]: 2025-03-17T19:05:33.922091Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 19:05:33.930760 waagent[1626]: 2025-03-17T19:05:33.930697Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 19:05:33.931259 waagent[1626]: 2025-03-17T19:05:33.931195Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 19:05:33.937534 waagent[1626]: 2025-03-17T19:05:33.937431Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Mar 17 19:05:33.938531 waagent[1626]: 2025-03-17T19:05:33.938462Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Mar 17 19:05:33.939997 waagent[1626]: 2025-03-17T19:05:33.939934Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 19:05:33.940604 waagent[1626]: 2025-03-17T19:05:33.940548Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:33.940791 waagent[1626]: 2025-03-17T19:05:33.940741Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:33.941345 waagent[1626]: 2025-03-17T19:05:33.941287Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 19:05:33.941631 waagent[1626]: 2025-03-17T19:05:33.941575Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 19:05:33.941631 waagent[1626]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 19:05:33.941631 waagent[1626]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 19:05:33.941631 waagent[1626]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 19:05:33.941631 waagent[1626]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:33.941631 waagent[1626]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:33.941631 waagent[1626]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 19:05:33.944813 waagent[1626]: 2025-03-17T19:05:33.944742Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 19:05:33.945048 waagent[1626]: 2025-03-17T19:05:33.944979Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 19:05:33.945538 waagent[1626]: 2025-03-17T19:05:33.945475Z INFO EnvHandler ExtHandler Configure routes Mar 17 19:05:33.945687 waagent[1626]: 2025-03-17T19:05:33.944471Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 19:05:33.945760 waagent[1626]: 2025-03-17T19:05:33.945647Z INFO EnvHandler ExtHandler Gateway:None Mar 17 19:05:33.945873 waagent[1626]: 2025-03-17T19:05:33.945822Z INFO EnvHandler ExtHandler Routes:None Mar 17 19:05:33.951188 waagent[1626]: 2025-03-17T19:05:33.950923Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 19:05:33.952131 waagent[1626]: 2025-03-17T19:05:33.952048Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 19:05:33.956985 waagent[1626]: 2025-03-17T19:05:33.956888Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 19:05:33.959500 waagent[1626]: 2025-03-17T19:05:33.956426Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 19:05:33.959906 waagent[1626]: 2025-03-17T19:05:33.959848Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 19:05:33.971616 waagent[1626]: 2025-03-17T19:05:33.971543Z INFO ExtHandler ExtHandler Downloading agent manifest Mar 17 19:05:33.973903 waagent[1626]: 2025-03-17T19:05:33.973845Z INFO MonitorHandler ExtHandler Network interfaces: Mar 17 19:05:33.973903 waagent[1626]: Executing ['ip', '-a', '-o', 'link']: Mar 17 19:05:33.973903 waagent[1626]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Mar 17 19:05:33.973903 waagent[1626]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:36:51:e2 brd ff:ff:ff:ff:ff:ff Mar 17 19:05:33.973903 waagent[1626]: 3: enP12554s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:36:51:e2 brd ff:ff:ff:ff:ff:ff\ altname enP12554p0s2 Mar 17 19:05:33.973903 waagent[1626]: Executing ['ip', '-4', '-a', '-o', 'address']: Mar 17 19:05:33.973903 waagent[1626]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Mar 17 19:05:33.973903 waagent[1626]: 2: eth0 inet 10.200.8.16/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Mar 17 19:05:33.973903 waagent[1626]: Executing ['ip', '-6', '-a', '-o', 'address']: Mar 17 19:05:33.973903 waagent[1626]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Mar 17 19:05:33.973903 waagent[1626]: 2: eth0 inet6 fe80::7e1e:52ff:fe36:51e2/64 scope link \ valid_lft forever preferred_lft forever Mar 17 19:05:34.007781 waagent[1626]: 2025-03-17T19:05:34.007676Z INFO ExtHandler ExtHandler Mar 17 19:05:34.008001 waagent[1626]: 2025-03-17T19:05:34.007926Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d7cb95c9-16a9-43b3-92f0-fb92f54d9232 correlation 5ff9fcc1-4fd9-47a6-bdf3-2a77ef3c7c7b created: 2025-03-17T19:04:01.490570Z] Mar 17 19:05:34.009112 waagent[1626]: 2025-03-17T19:05:34.009042Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 19:05:34.011018 waagent[1626]: 2025-03-17T19:05:34.010957Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Mar 17 19:05:34.041005 waagent[1626]: 2025-03-17T19:05:34.040931Z INFO ExtHandler ExtHandler Looking for existing remote access users. Mar 17 19:05:34.055944 waagent[1626]: 2025-03-17T19:05:34.055863Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 29A98F8D-EB66-4C1A-A99A-23BA7673083D;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Mar 17 19:05:34.190903 waagent[1626]: 2025-03-17T19:05:34.190694Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Mar 17 19:05:34.190903 waagent[1626]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.190903 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.190903 waagent[1626]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.190903 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.190903 waagent[1626]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.190903 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.190903 waagent[1626]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 19:05:34.190903 waagent[1626]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 19:05:34.190903 waagent[1626]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 19:05:34.198749 waagent[1626]: 2025-03-17T19:05:34.198595Z INFO EnvHandler ExtHandler Current Firewall rules: Mar 17 19:05:34.198749 waagent[1626]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.198749 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.198749 waagent[1626]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.198749 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.198749 waagent[1626]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 19:05:34.198749 waagent[1626]: pkts bytes target prot opt in out source destination Mar 17 19:05:34.198749 waagent[1626]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 19:05:34.198749 waagent[1626]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 19:05:34.198749 waagent[1626]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 19:05:34.199383 waagent[1626]: 2025-03-17T19:05:34.199325Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Mar 17 19:05:43.800267 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 19:05:43.800592 systemd[1]: Stopped kubelet.service. Mar 17 19:05:43.802830 systemd[1]: Starting kubelet.service... Mar 17 19:05:43.887954 systemd[1]: Started kubelet.service. Mar 17 19:05:44.482187 kubelet[1693]: E0317 19:05:44.482125 1693 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:05:44.484054 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:05:44.484224 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:05:54.550193 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 19:05:54.550530 systemd[1]: Stopped kubelet.service. Mar 17 19:05:54.552738 systemd[1]: Starting kubelet.service... Mar 17 19:05:54.638161 systemd[1]: Started kubelet.service. Mar 17 19:05:55.237141 kubelet[1703]: E0317 19:05:55.237080 1703 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:05:55.238827 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:05:55.238994 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:05:59.924147 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Mar 17 19:06:05.300139 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Mar 17 19:06:05.300477 systemd[1]: Stopped kubelet.service. Mar 17 19:06:05.302722 systemd[1]: Starting kubelet.service... Mar 17 19:06:05.388390 systemd[1]: Started kubelet.service. Mar 17 19:06:05.931105 kubelet[1712]: E0317 19:06:05.931046 1712 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:06:05.932873 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:06:05.933039 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:06:07.119921 update_engine[1427]: I0317 19:06:07.119828 1427 update_attempter.cc:509] Updating boot flags... Mar 17 19:06:09.174568 systemd[1]: Created slice system-sshd.slice. Mar 17 19:06:09.177026 systemd[1]: Started sshd@0-10.200.8.16:22-10.200.16.10:46280.service. Mar 17 19:06:10.044415 sshd[1784]: Accepted publickey for core from 10.200.16.10 port 46280 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:10.046263 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:10.051425 systemd[1]: Started session-3.scope. Mar 17 19:06:10.051972 systemd-logind[1424]: New session 3 of user core. Mar 17 19:06:10.598352 systemd[1]: Started sshd@1-10.200.8.16:22-10.200.16.10:46282.service. Mar 17 19:06:11.228735 sshd[1789]: Accepted publickey for core from 10.200.16.10 port 46282 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:11.230504 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:11.235937 systemd-logind[1424]: New session 4 of user core. Mar 17 19:06:11.236712 systemd[1]: Started session-4.scope. Mar 17 19:06:11.675820 sshd[1789]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:11.679284 systemd[1]: sshd@1-10.200.8.16:22-10.200.16.10:46282.service: Deactivated successfully. Mar 17 19:06:11.680391 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 19:06:11.681180 systemd-logind[1424]: Session 4 logged out. Waiting for processes to exit. Mar 17 19:06:11.682138 systemd-logind[1424]: Removed session 4. Mar 17 19:06:11.780489 systemd[1]: Started sshd@2-10.200.8.16:22-10.200.16.10:46290.service. Mar 17 19:06:12.410149 sshd[1795]: Accepted publickey for core from 10.200.16.10 port 46290 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:12.411923 sshd[1795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:12.417797 systemd[1]: Started session-5.scope. Mar 17 19:06:12.418356 systemd-logind[1424]: New session 5 of user core. Mar 17 19:06:12.850741 sshd[1795]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:12.854204 systemd[1]: sshd@2-10.200.8.16:22-10.200.16.10:46290.service: Deactivated successfully. Mar 17 19:06:12.855292 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 19:06:12.856127 systemd-logind[1424]: Session 5 logged out. Waiting for processes to exit. Mar 17 19:06:12.857089 systemd-logind[1424]: Removed session 5. Mar 17 19:06:12.956497 systemd[1]: Started sshd@3-10.200.8.16:22-10.200.16.10:46298.service. Mar 17 19:06:13.586847 sshd[1804]: Accepted publickey for core from 10.200.16.10 port 46298 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:13.588682 sshd[1804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:13.594693 systemd[1]: Started session-6.scope. Mar 17 19:06:13.595459 systemd-logind[1424]: New session 6 of user core. Mar 17 19:06:14.050680 sshd[1804]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:14.054094 systemd[1]: sshd@3-10.200.8.16:22-10.200.16.10:46298.service: Deactivated successfully. Mar 17 19:06:14.055424 systemd-logind[1424]: Session 6 logged out. Waiting for processes to exit. Mar 17 19:06:14.055538 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 19:06:14.056712 systemd-logind[1424]: Removed session 6. Mar 17 19:06:14.156636 systemd[1]: Started sshd@4-10.200.8.16:22-10.200.16.10:46306.service. Mar 17 19:06:14.787581 sshd[1810]: Accepted publickey for core from 10.200.16.10 port 46306 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:14.789385 sshd[1810]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:14.794592 systemd[1]: Started session-7.scope. Mar 17 19:06:14.795227 systemd-logind[1424]: New session 7 of user core. Mar 17 19:06:15.476720 sudo[1813]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 19:06:15.477041 sudo[1813]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:06:15.513929 dbus-daemon[1412]: \xd0\xcd\xcc\u001dsU: received setenforce notice (enforcing=-1388055760) Mar 17 19:06:15.516361 sudo[1813]: pam_unix(sudo:session): session closed for user root Mar 17 19:06:15.660260 sshd[1810]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:15.664528 systemd[1]: sshd@4-10.200.8.16:22-10.200.16.10:46306.service: Deactivated successfully. Mar 17 19:06:15.665765 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 19:06:15.666619 systemd-logind[1424]: Session 7 logged out. Waiting for processes to exit. Mar 17 19:06:15.667735 systemd-logind[1424]: Removed session 7. Mar 17 19:06:15.766047 systemd[1]: Started sshd@5-10.200.8.16:22-10.200.16.10:46318.service. Mar 17 19:06:16.050275 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Mar 17 19:06:16.050596 systemd[1]: Stopped kubelet.service. Mar 17 19:06:16.052818 systemd[1]: Starting kubelet.service... Mar 17 19:06:16.230668 systemd[1]: Started kubelet.service. Mar 17 19:06:16.269494 kubelet[1823]: E0317 19:06:16.269435 1823 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:06:16.271219 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:06:16.271387 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:06:16.398494 sshd[1817]: Accepted publickey for core from 10.200.16.10 port 46318 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:16.400197 sshd[1817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:16.406260 systemd[1]: Started session-8.scope. Mar 17 19:06:16.406861 systemd-logind[1424]: New session 8 of user core. Mar 17 19:06:16.744288 sudo[1830]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 19:06:16.744980 sudo[1830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:06:16.747952 sudo[1830]: pam_unix(sudo:session): session closed for user root Mar 17 19:06:16.752887 sudo[1829]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 19:06:16.753171 sudo[1829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:06:16.762548 systemd[1]: Stopping audit-rules.service... Mar 17 19:06:16.762000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 19:06:16.769868 auditctl[1833]: No rules Mar 17 19:06:16.762000 audit[1833]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4bb73b90 a2=420 a3=0 items=0 ppid=1 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:16.770385 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 19:06:16.770559 systemd[1]: Stopped audit-rules.service. Mar 17 19:06:16.772436 systemd[1]: Starting audit-rules.service... Mar 17 19:06:16.787379 kernel: audit: type=1305 audit(1742238376.762:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 19:06:16.787495 kernel: audit: type=1300 audit(1742238376.762:218): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe4bb73b90 a2=420 a3=0 items=0 ppid=1 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:16.762000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 19:06:16.792000 kernel: audit: type=1327 audit(1742238376.762:218): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 19:06:16.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.796514 augenrules[1850]: No rules Mar 17 19:06:16.797376 systemd[1]: Finished audit-rules.service. Mar 17 19:06:16.798528 sudo[1829]: pam_unix(sudo:session): session closed for user root Mar 17 19:06:16.802573 kernel: audit: type=1131 audit(1742238376.768:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.802641 kernel: audit: type=1130 audit(1742238376.791:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.796000 audit[1829]: USER_END pid=1829 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.825415 kernel: audit: type=1106 audit(1742238376.796:221): pid=1829 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.825683 kernel: audit: type=1104 audit(1742238376.796:222): pid=1829 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.796000 audit[1829]: CRED_DISP pid=1829 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.900017 sshd[1817]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:16.899000 audit[1817]: USER_END pid=1817 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:16.903427 systemd[1]: sshd@5-10.200.8.16:22-10.200.16.10:46318.service: Deactivated successfully. Mar 17 19:06:16.904522 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 19:06:16.906139 systemd-logind[1424]: Session 8 logged out. Waiting for processes to exit. Mar 17 19:06:16.907298 systemd-logind[1424]: Removed session 8. Mar 17 19:06:16.899000 audit[1817]: CRED_DISP pid=1817 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:16.930447 kernel: audit: type=1106 audit(1742238376.899:223): pid=1817 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:16.930533 kernel: audit: type=1104 audit(1742238376.899:224): pid=1817 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:16.930564 kernel: audit: type=1131 audit(1742238376.900:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.16:22-10.200.16.10:46318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:16.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.16:22-10.200.16.10:46318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:17.005767 systemd[1]: Started sshd@6-10.200.8.16:22-10.200.16.10:46324.service. Mar 17 19:06:17.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.16:22-10.200.16.10:46324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:17.635000 audit[1856]: USER_ACCT pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:17.637279 sshd[1856]: Accepted publickey for core from 10.200.16.10 port 46324 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:06:17.636000 audit[1856]: CRED_ACQ pid=1856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:17.636000 audit[1856]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcefe4fa70 a2=3 a3=0 items=0 ppid=1 pid=1856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:17.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:06:17.639131 sshd[1856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:06:17.644840 systemd[1]: Started session-9.scope. Mar 17 19:06:17.645465 systemd-logind[1424]: New session 9 of user core. Mar 17 19:06:17.648000 audit[1856]: USER_START pid=1856 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:17.650000 audit[1858]: CRED_ACQ pid=1858 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:17.981000 audit[1859]: USER_ACCT pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:17.981000 audit[1859]: CRED_REFR pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:17.982846 sudo[1859]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 19:06:17.983165 sudo[1859]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 19:06:17.983000 audit[1859]: USER_START pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:18.010688 systemd[1]: Starting docker.service... Mar 17 19:06:18.051778 env[1869]: time="2025-03-17T19:06:18.051714217Z" level=info msg="Starting up" Mar 17 19:06:18.053251 env[1869]: time="2025-03-17T19:06:18.053208516Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 19:06:18.053251 env[1869]: time="2025-03-17T19:06:18.053232916Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 19:06:18.053437 env[1869]: time="2025-03-17T19:06:18.053258816Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 19:06:18.053437 env[1869]: time="2025-03-17T19:06:18.053271616Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 19:06:18.055283 env[1869]: time="2025-03-17T19:06:18.055251214Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 19:06:18.055283 env[1869]: time="2025-03-17T19:06:18.055271614Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 19:06:18.055497 env[1869]: time="2025-03-17T19:06:18.055293414Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 19:06:18.055497 env[1869]: time="2025-03-17T19:06:18.055307014Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 19:06:18.063275 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1066276329-merged.mount: Deactivated successfully. Mar 17 19:06:18.150106 env[1869]: time="2025-03-17T19:06:18.150056829Z" level=info msg="Loading containers: start." Mar 17 19:06:18.231000 audit[1896]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.231000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdbcf5f780 a2=0 a3=7ffdbcf5f76c items=0 ppid=1869 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Mar 17 19:06:18.233000 audit[1898]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.233000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc813a3c70 a2=0 a3=7ffc813a3c5c items=0 ppid=1869 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Mar 17 19:06:18.235000 audit[1900]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.235000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbf806a30 a2=0 a3=7fffbf806a1c items=0 ppid=1869 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 19:06:18.237000 audit[1902]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.237000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefa776850 a2=0 a3=7ffefa77683c items=0 ppid=1869 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.237000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 19:06:18.239000 audit[1904]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.239000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdf1f0cf0 a2=0 a3=7fffdf1f0cdc items=0 ppid=1869 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.239000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Mar 17 19:06:18.241000 audit[1906]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.241000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd8a9f070 a2=0 a3=7ffcd8a9f05c items=0 ppid=1869 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.241000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Mar 17 19:06:18.265000 audit[1908]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.265000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe80c142a0 a2=0 a3=7ffe80c1428c items=0 ppid=1869 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Mar 17 19:06:18.267000 audit[1910]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.267000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc0cf5d880 a2=0 a3=7ffc0cf5d86c items=0 ppid=1869 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Mar 17 19:06:18.269000 audit[1912]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.269000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff21910e10 a2=0 a3=7fff21910dfc items=0 ppid=1869 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.269000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 19:06:18.300000 audit[1916]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.300000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff0b956630 a2=0 a3=7fff0b95661c items=0 ppid=1869 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 19:06:18.304000 audit[1917]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.304000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdfd783380 a2=0 a3=7ffdfd78336c items=0 ppid=1869 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 19:06:18.378698 kernel: Initializing XFRM netlink socket Mar 17 19:06:18.409375 env[1869]: time="2025-03-17T19:06:18.409310197Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 17 19:06:18.476000 audit[1925]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.476000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe60032370 a2=0 a3=7ffe6003235c items=0 ppid=1869 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Mar 17 19:06:18.529000 audit[1928]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.529000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffd305e060 a2=0 a3=7fffd305e04c items=0 ppid=1869 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Mar 17 19:06:18.533000 audit[1931]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.533000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd3b4e6a50 a2=0 a3=7ffd3b4e6a3c items=0 ppid=1869 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Mar 17 19:06:18.535000 audit[1933]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.535000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd363f6bc0 a2=0 a3=7ffd363f6bac items=0 ppid=1869 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Mar 17 19:06:18.537000 audit[1935]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.537000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcf2627630 a2=0 a3=7ffcf262761c items=0 ppid=1869 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.537000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Mar 17 19:06:18.540000 audit[1937]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.540000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff4ad95860 a2=0 a3=7fff4ad9584c items=0 ppid=1869 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Mar 17 19:06:18.542000 audit[1939]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.542000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe1f0d8b30 a2=0 a3=7ffe1f0d8b1c items=0 ppid=1869 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.542000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Mar 17 19:06:18.544000 audit[1941]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.544000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffee10cd330 a2=0 a3=7ffee10cd31c items=0 ppid=1869 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Mar 17 19:06:18.546000 audit[1943]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.546000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff6d5ee0b0 a2=0 a3=7fff6d5ee09c items=0 ppid=1869 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.546000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 19:06:18.548000 audit[1945]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.548000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff15538460 a2=0 a3=7fff1553844c items=0 ppid=1869 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.548000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 19:06:18.550000 audit[1947]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.550000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff18a336c0 a2=0 a3=7fff18a336ac items=0 ppid=1869 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.550000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Mar 17 19:06:18.552971 systemd-networkd[1590]: docker0: Link UP Mar 17 19:06:18.576000 audit[1951]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.576000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe2085150 a2=0 a3=7fffe208513c items=0 ppid=1869 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 19:06:18.581000 audit[1952]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:18.581000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe22f134e0 a2=0 a3=7ffe22f134cc items=0 ppid=1869 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:18.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 19:06:18.584080 env[1869]: time="2025-03-17T19:06:18.584041624Z" level=info msg="Loading containers: done." Mar 17 19:06:18.630496 env[1869]: time="2025-03-17T19:06:18.630428646Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Mar 17 19:06:18.630833 env[1869]: time="2025-03-17T19:06:18.630771346Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Mar 17 19:06:18.630975 env[1869]: time="2025-03-17T19:06:18.630944847Z" level=info msg="Daemon has completed initialization" Mar 17 19:06:18.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:18.669960 systemd[1]: Started docker.service. Mar 17 19:06:18.677976 env[1869]: time="2025-03-17T19:06:18.677898470Z" level=info msg="API listen on /run/docker.sock" Mar 17 19:06:20.393168 env[1440]: time="2025-03-17T19:06:20.393111517Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.7\"" Mar 17 19:06:21.202972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2074971883.mount: Deactivated successfully. Mar 17 19:06:23.010263 env[1440]: time="2025-03-17T19:06:23.010201922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:23.015953 env[1440]: time="2025-03-17T19:06:23.015899383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f084bc047a8cf7c8484d47c51e70e646dde3977d916f282feb99207b7b9241af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:23.020096 env[1440]: time="2025-03-17T19:06:23.020054600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:23.026256 env[1440]: time="2025-03-17T19:06:23.025830663Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:22c19cc70fe5806d0a2cb28a6b6b33fd34e6f9e50616bdf6d53649bcfafbc277,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:23.026681 env[1440]: time="2025-03-17T19:06:23.026638586Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.7\" returns image reference \"sha256:f084bc047a8cf7c8484d47c51e70e646dde3977d916f282feb99207b7b9241af\"" Mar 17 19:06:23.028540 env[1440]: time="2025-03-17T19:06:23.028503439Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.7\"" Mar 17 19:06:24.752605 env[1440]: time="2025-03-17T19:06:24.752524122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:24.763729 env[1440]: time="2025-03-17T19:06:24.763646527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:652dcad615a9a0c252c253860d5b5b7bfebd3efe159dc033a8555bc15a6d1985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:24.767928 env[1440]: time="2025-03-17T19:06:24.767885344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:24.772896 env[1440]: time="2025-03-17T19:06:24.772850180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6abe7a0accecf29db6ebab18a10f844678ffed693d79e2e51a18a6f2b4530cbb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:24.773571 env[1440]: time="2025-03-17T19:06:24.773537199Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.7\" returns image reference \"sha256:652dcad615a9a0c252c253860d5b5b7bfebd3efe159dc033a8555bc15a6d1985\"" Mar 17 19:06:24.774475 env[1440]: time="2025-03-17T19:06:24.774446324Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.7\"" Mar 17 19:06:26.299927 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Mar 17 19:06:26.300198 systemd[1]: Stopped kubelet.service. Mar 17 19:06:26.314861 kernel: kauditd_printk_skb: 84 callbacks suppressed Mar 17 19:06:26.315019 kernel: audit: type=1130 audit(1742238386.298:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.301962 systemd[1]: Starting kubelet.service... Mar 17 19:06:26.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.326673 kernel: audit: type=1131 audit(1742238386.298:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.390186 systemd[1]: Started kubelet.service. Mar 17 19:06:26.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.402721 kernel: audit: type=1130 audit(1742238386.388:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:26.656233 env[1440]: time="2025-03-17T19:06:26.656066874Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:26.971332 env[1440]: time="2025-03-17T19:06:26.971115659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f1f6a63d8aa14cf61d0045e912ad312b4ade24637cecccc933b163582eae68c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:26.983453 env[1440]: time="2025-03-17T19:06:26.983388978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:26.994755 kubelet[1989]: E0317 19:06:26.994696 1989 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:06:26.996682 env[1440]: time="2025-03-17T19:06:26.995565895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:fb80249bcb77ee72b1c9fa5b70bc28a83ed107c9ca71957841ad91db379963bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:26.997807 env[1440]: time="2025-03-17T19:06:26.996896829Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.7\" returns image reference \"sha256:7f1f6a63d8aa14cf61d0045e912ad312b4ade24637cecccc933b163582eae68c\"" Mar 17 19:06:26.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:06:26.997318 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:06:27.001113 env[1440]: time="2025-03-17T19:06:26.999616200Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\"" Mar 17 19:06:26.997491 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:06:27.010682 kernel: audit: type=1131 audit(1742238386.996:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:06:28.230001 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3632972480.mount: Deactivated successfully. Mar 17 19:06:28.867635 env[1440]: time="2025-03-17T19:06:28.867572232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:28.874244 env[1440]: time="2025-03-17T19:06:28.874193895Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:28.878159 env[1440]: time="2025-03-17T19:06:28.878098991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:28.882059 env[1440]: time="2025-03-17T19:06:28.882019587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:e5839270c96c3ad1bea1dce4935126d3281297527f3655408d2970aa4b5cf178,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:28.882413 env[1440]: time="2025-03-17T19:06:28.882378296Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\" returns image reference \"sha256:dcfc039c372ea285997a302d60e58a75b80905b4c4dba969993b9b22e8ac66d1\"" Mar 17 19:06:28.883316 env[1440]: time="2025-03-17T19:06:28.883283818Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Mar 17 19:06:29.487643 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2325375514.mount: Deactivated successfully. Mar 17 19:06:30.920611 env[1440]: time="2025-03-17T19:06:30.920549280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:30.929817 env[1440]: time="2025-03-17T19:06:30.929764595Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:30.937807 env[1440]: time="2025-03-17T19:06:30.937766281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:30.944693 env[1440]: time="2025-03-17T19:06:30.944638041Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:30.945367 env[1440]: time="2025-03-17T19:06:30.945331757Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Mar 17 19:06:30.946180 env[1440]: time="2025-03-17T19:06:30.946151077Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Mar 17 19:06:31.485331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2162968101.mount: Deactivated successfully. Mar 17 19:06:31.515612 env[1440]: time="2025-03-17T19:06:31.515551936Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:31.534749 env[1440]: time="2025-03-17T19:06:31.534691870Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:31.540559 env[1440]: time="2025-03-17T19:06:31.540513702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:31.546302 env[1440]: time="2025-03-17T19:06:31.546258232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:31.546722 env[1440]: time="2025-03-17T19:06:31.546694242Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Mar 17 19:06:31.547469 env[1440]: time="2025-03-17T19:06:31.547435359Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Mar 17 19:06:32.208726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2438515297.mount: Deactivated successfully. Mar 17 19:06:34.929911 env[1440]: time="2025-03-17T19:06:34.929845896Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:34.939848 env[1440]: time="2025-03-17T19:06:34.939794804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:34.946394 env[1440]: time="2025-03-17T19:06:34.946348141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:34.954992 env[1440]: time="2025-03-17T19:06:34.954949221Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:34.955763 env[1440]: time="2025-03-17T19:06:34.955728538Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Mar 17 19:06:37.050117 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Mar 17 19:06:37.050385 systemd[1]: Stopped kubelet.service. Mar 17 19:06:37.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.066688 kernel: audit: type=1130 audit(1742238397.049:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.067082 systemd[1]: Starting kubelet.service... Mar 17 19:06:37.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.081669 kernel: audit: type=1131 audit(1742238397.049:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.239823 kernel: audit: type=1130 audit(1742238397.223:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.223725 systemd[1]: Started kubelet.service. Mar 17 19:06:37.282943 kubelet[2016]: E0317 19:06:37.282890 2016 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 19:06:37.285263 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 19:06:37.285422 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 19:06:37.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:06:37.301782 kernel: audit: type=1131 audit(1742238397.285:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 19:06:37.728806 systemd[1]: Stopped kubelet.service. Mar 17 19:06:37.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.731280 systemd[1]: Starting kubelet.service... Mar 17 19:06:37.747242 kernel: audit: type=1130 audit(1742238397.728:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.747330 kernel: audit: type=1131 audit(1742238397.728:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:37.784025 systemd[1]: Reloading. Mar 17 19:06:37.867360 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2025-03-17T19:06:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:06:37.867400 /usr/lib/systemd/system-generators/torcx-generator[2051]: time="2025-03-17T19:06:37Z" level=info msg="torcx already run" Mar 17 19:06:37.992954 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:06:37.992974 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:06:38.009332 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108577 kernel: audit: type=1400 audit(1742238398.080:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108779 kernel: audit: type=1400 audit(1742238398.080:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122910 kernel: audit: type=1400 audit(1742238398.080:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit: BPF prog-id=47 op=LOAD Mar 17 19:06:38.136695 kernel: audit: type=1400 audit(1742238398.080:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit: BPF prog-id=41 op=UNLOAD Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit: BPF prog-id=48 op=LOAD Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit: BPF prog-id=49 op=LOAD Mar 17 19:06:38.108000 audit: BPF prog-id=42 op=UNLOAD Mar 17 19:06:38.108000 audit: BPF prog-id=43 op=UNLOAD Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit: BPF prog-id=50 op=LOAD Mar 17 19:06:38.122000 audit: BPF prog-id=30 op=UNLOAD Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit: BPF prog-id=51 op=LOAD Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.122000 audit: BPF prog-id=52 op=LOAD Mar 17 19:06:38.122000 audit: BPF prog-id=31 op=UNLOAD Mar 17 19:06:38.122000 audit: BPF prog-id=32 op=UNLOAD Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit: BPF prog-id=53 op=LOAD Mar 17 19:06:38.136000 audit: BPF prog-id=33 op=UNLOAD Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit: BPF prog-id=56 op=LOAD Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.139000 audit: BPF prog-id=58 op=LOAD Mar 17 19:06:38.139000 audit: BPF prog-id=46 op=UNLOAD Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.141000 audit: BPF prog-id=59 op=LOAD Mar 17 19:06:38.141000 audit: BPF prog-id=39 op=UNLOAD Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.143000 audit: BPF prog-id=60 op=LOAD Mar 17 19:06:38.143000 audit: BPF prog-id=40 op=UNLOAD Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:38.144000 audit: BPF prog-id=61 op=LOAD Mar 17 19:06:38.144000 audit: BPF prog-id=44 op=UNLOAD Mar 17 19:06:38.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:38.163834 systemd[1]: Started kubelet.service. Mar 17 19:06:38.166750 systemd[1]: Stopping kubelet.service... Mar 17 19:06:38.167244 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 19:06:38.167435 systemd[1]: Stopped kubelet.service. Mar 17 19:06:38.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:38.169249 systemd[1]: Starting kubelet.service... Mar 17 19:06:38.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:38.369640 systemd[1]: Started kubelet.service. Mar 17 19:06:38.408227 kubelet[2118]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:06:38.408594 kubelet[2118]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 19:06:38.408642 kubelet[2118]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:06:38.408796 kubelet[2118]: I0317 19:06:38.408770 2118 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 19:06:38.680006 kubelet[2118]: I0317 19:06:38.679608 2118 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 19:06:38.680006 kubelet[2118]: I0317 19:06:38.679648 2118 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 19:06:38.680422 kubelet[2118]: I0317 19:06:38.680397 2118 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 19:06:39.114437 kubelet[2118]: E0317 19:06:39.114387 2118 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.8.16:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:39.118636 kubelet[2118]: I0317 19:06:39.118604 2118 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 19:06:39.126117 kubelet[2118]: E0317 19:06:39.126062 2118 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 19:06:39.126283 kubelet[2118]: I0317 19:06:39.126261 2118 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 19:06:39.130888 kubelet[2118]: I0317 19:06:39.130863 2118 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 19:06:39.132178 kubelet[2118]: I0317 19:06:39.132153 2118 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 19:06:39.132387 kubelet[2118]: I0317 19:06:39.132348 2118 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 19:06:39.132576 kubelet[2118]: I0317 19:06:39.132387 2118 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-a-9eb0e2b4dd","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 19:06:39.132745 kubelet[2118]: I0317 19:06:39.132583 2118 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 19:06:39.132745 kubelet[2118]: I0317 19:06:39.132596 2118 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 19:06:39.132841 kubelet[2118]: I0317 19:06:39.132784 2118 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:06:39.140294 kubelet[2118]: I0317 19:06:39.140267 2118 kubelet.go:408] "Attempting to sync node with API server" Mar 17 19:06:39.140403 kubelet[2118]: I0317 19:06:39.140303 2118 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 19:06:39.140403 kubelet[2118]: I0317 19:06:39.140341 2118 kubelet.go:314] "Adding apiserver pod source" Mar 17 19:06:39.140403 kubelet[2118]: I0317 19:06:39.140359 2118 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 19:06:39.140665 kubelet[2118]: W0317 19:06:39.140601 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.16:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-9eb0e2b4dd&limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:39.140753 kubelet[2118]: E0317 19:06:39.140680 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.8.16:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-9eb0e2b4dd&limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:39.149851 kubelet[2118]: W0317 19:06:39.149796 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.16:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:39.150037 kubelet[2118]: E0317 19:06:39.150015 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.8.16:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:39.150307 kubelet[2118]: I0317 19:06:39.150290 2118 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 19:06:39.157897 kubelet[2118]: I0317 19:06:39.157877 2118 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 19:06:39.158114 kubelet[2118]: W0317 19:06:39.158102 2118 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 19:06:39.159324 kubelet[2118]: I0317 19:06:39.159298 2118 server.go:1269] "Started kubelet" Mar 17 19:06:39.160928 kubelet[2118]: I0317 19:06:39.160896 2118 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 19:06:39.162909 kubelet[2118]: I0317 19:06:39.162881 2118 server.go:460] "Adding debug handlers to kubelet server" Mar 17 19:06:39.166119 kubelet[2118]: I0317 19:06:39.166061 2118 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 19:06:39.166531 kubelet[2118]: I0317 19:06:39.166510 2118 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 19:06:39.168366 kubelet[2118]: E0317 19:06:39.166863 2118 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.16:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.16:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-a-9eb0e2b4dd.182dac97dfeefea7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-a-9eb0e2b4dd,UID:ci-3510.3.7-a-9eb0e2b4dd,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-a-9eb0e2b4dd,},FirstTimestamp:2025-03-17 19:06:39.159271079 +0000 UTC m=+0.782831991,LastTimestamp:2025-03-17 19:06:39.159271079 +0000 UTC m=+0.782831991,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-a-9eb0e2b4dd,}" Mar 17 19:06:39.169000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:39.169000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:39.169000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b605d0 a1=c000afafc0 a2=c000b605a0 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:39.170283 kubelet[2118]: I0317 19:06:39.170257 2118 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 19:06:39.169000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:39.169000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:39.169000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000632500 a1=c000afafd8 a2=c000b60660 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:39.170737 kubelet[2118]: I0317 19:06:39.170718 2118 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 19:06:39.170922 kubelet[2118]: I0317 19:06:39.170906 2118 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 19:06:39.171388 kubelet[2118]: I0317 19:06:39.171366 2118 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 19:06:39.174067 kubelet[2118]: E0317 19:06:39.174045 2118 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 19:06:39.174421 kubelet[2118]: I0317 19:06:39.174403 2118 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 19:06:39.174546 kubelet[2118]: I0317 19:06:39.174530 2118 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 19:06:39.174604 kubelet[2118]: I0317 19:06:39.174594 2118 reconciler.go:26] "Reconciler: start to sync state" Mar 17 19:06:39.175366 kubelet[2118]: W0317 19:06:39.175312 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.16:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:39.175454 kubelet[2118]: E0317 19:06:39.175379 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.8.16:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:39.175727 kubelet[2118]: I0317 19:06:39.175702 2118 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 19:06:39.177322 kubelet[2118]: I0317 19:06:39.177299 2118 factory.go:221] Registration of the containerd container factory successfully Mar 17 19:06:39.177322 kubelet[2118]: I0317 19:06:39.177321 2118 factory.go:221] Registration of the systemd container factory successfully Mar 17 19:06:39.177000 audit[2128]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.177000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc003db70 a2=0 a3=7fffc003db5c items=0 ppid=2118 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 19:06:39.180000 audit[2129]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.180000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2040ee40 a2=0 a3=7ffe2040ee2c items=0 ppid=2118 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 19:06:39.182930 kubelet[2118]: E0317 19:06:39.182906 2118 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-a-9eb0e2b4dd\" not found" Mar 17 19:06:39.184000 audit[2131]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.184000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4fc8bb10 a2=0 a3=7ffd4fc8bafc items=0 ppid=2118 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:06:39.186000 audit[2133]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.186000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd5ca07520 a2=0 a3=7ffd5ca0750c items=0 ppid=2118 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:06:39.198810 kubelet[2118]: E0317 19:06:39.198763 2118 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-9eb0e2b4dd?timeout=10s\": dial tcp 10.200.8.16:6443: connect: connection refused" interval="200ms" Mar 17 19:06:39.238724 kubelet[2118]: I0317 19:06:39.238687 2118 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 19:06:39.238724 kubelet[2118]: I0317 19:06:39.238710 2118 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 19:06:39.238993 kubelet[2118]: I0317 19:06:39.238736 2118 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:06:39.251456 kubelet[2118]: I0317 19:06:39.251411 2118 policy_none.go:49] "None policy: Start" Mar 17 19:06:39.252419 kubelet[2118]: I0317 19:06:39.252390 2118 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 19:06:39.252419 kubelet[2118]: I0317 19:06:39.252425 2118 state_mem.go:35] "Initializing new in-memory state store" Mar 17 19:06:39.263583 systemd[1]: Created slice kubepods.slice. Mar 17 19:06:39.268449 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 19:06:39.272363 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 19:06:39.278516 kubelet[2118]: I0317 19:06:39.278484 2118 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 19:06:39.278000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:39.278000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:39.278000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da08a0 a1=c000d799c8 a2=c000da0870 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.278000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:39.285301 kubelet[2118]: E0317 19:06:39.283858 2118 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-a-9eb0e2b4dd\" not found" Mar 17 19:06:39.285301 kubelet[2118]: I0317 19:06:39.284693 2118 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 19:06:39.285301 kubelet[2118]: I0317 19:06:39.284930 2118 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 19:06:39.286242 kubelet[2118]: I0317 19:06:39.284944 2118 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 19:06:39.286594 kubelet[2118]: E0317 19:06:39.286569 2118 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-a-9eb0e2b4dd\" not found" Mar 17 19:06:39.286910 kubelet[2118]: I0317 19:06:39.286892 2118 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 19:06:39.289000 audit[2141]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.289000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe2250cc30 a2=0 a3=7ffe2250cc1c items=0 ppid=2118 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 19:06:39.290228 kubelet[2118]: I0317 19:06:39.290197 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 19:06:39.290000 audit[2142]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:39.290000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde5f21d20 a2=0 a3=7ffde5f21d0c items=0 ppid=2118 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.290000 audit[2143]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.290000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf7e47870 a2=0 a3=7ffdf7e4785c items=0 ppid=2118 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 19:06:39.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 19:06:39.292178 kubelet[2118]: I0317 19:06:39.292151 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 19:06:39.292178 kubelet[2118]: I0317 19:06:39.292175 2118 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 19:06:39.292292 kubelet[2118]: I0317 19:06:39.292198 2118 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 19:06:39.292292 kubelet[2118]: E0317 19:06:39.292243 2118 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 19:06:39.292000 audit[2145]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:39.292000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffca706650 a2=0 a3=7fffca70663c items=0 ppid=2118 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 19:06:39.292000 audit[2144]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.292000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa9405a0 a2=0 a3=10e3 items=0 ppid=2118 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 19:06:39.294000 audit[2146]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:39.294000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe069c9590 a2=0 a3=7ffe069c957c items=0 ppid=2118 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 19:06:39.294000 audit[2147]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:39.294000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd76c417b0 a2=0 a3=7ffd76c4179c items=0 ppid=2118 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 19:06:39.296729 kubelet[2118]: W0317 19:06:39.296629 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.16:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:39.296840 kubelet[2118]: E0317 19:06:39.296749 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.8.16:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:39.296000 audit[2148]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:39.296000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff2c4f9f30 a2=0 a3=7fff2c4f9f1c items=0 ppid=2118 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:39.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 19:06:39.387958 kubelet[2118]: I0317 19:06:39.387845 2118 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.390801 kubelet[2118]: E0317 19:06:39.390762 2118 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.16:6443/api/v1/nodes\": dial tcp 10.200.8.16:6443: connect: connection refused" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.399447 kubelet[2118]: E0317 19:06:39.399406 2118 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-9eb0e2b4dd?timeout=10s\": dial tcp 10.200.8.16:6443: connect: connection refused" interval="400ms" Mar 17 19:06:39.402806 systemd[1]: Created slice kubepods-burstable-podbac41c33791804c1cb9908137d07c142.slice. Mar 17 19:06:39.410428 systemd[1]: Created slice kubepods-burstable-pod0214ca1d3e9ae6e70f11f5ac3b90bf2a.slice. Mar 17 19:06:39.418902 systemd[1]: Created slice kubepods-burstable-podd5a847f8d4f467923b6614765788c58b.slice. Mar 17 19:06:39.476402 kubelet[2118]: I0317 19:06:39.476338 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476402 kubelet[2118]: I0317 19:06:39.476399 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476997 kubelet[2118]: I0317 19:06:39.476431 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0214ca1d3e9ae6e70f11f5ac3b90bf2a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"0214ca1d3e9ae6e70f11f5ac3b90bf2a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476997 kubelet[2118]: I0317 19:06:39.476454 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476997 kubelet[2118]: I0317 19:06:39.476480 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476997 kubelet[2118]: I0317 19:06:39.476506 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.476997 kubelet[2118]: I0317 19:06:39.476535 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.477164 kubelet[2118]: I0317 19:06:39.476564 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.477164 kubelet[2118]: I0317 19:06:39.476602 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.592885 kubelet[2118]: I0317 19:06:39.592844 2118 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.593336 kubelet[2118]: E0317 19:06:39.593304 2118 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.16:6443/api/v1/nodes\": dial tcp 10.200.8.16:6443: connect: connection refused" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.710439 env[1440]: time="2025-03-17T19:06:39.710289508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd,Uid:bac41c33791804c1cb9908137d07c142,Namespace:kube-system,Attempt:0,}" Mar 17 19:06:39.717976 env[1440]: time="2025-03-17T19:06:39.717933448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd,Uid:0214ca1d3e9ae6e70f11f5ac3b90bf2a,Namespace:kube-system,Attempt:0,}" Mar 17 19:06:39.722477 env[1440]: time="2025-03-17T19:06:39.722424531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd,Uid:d5a847f8d4f467923b6614765788c58b,Namespace:kube-system,Attempt:0,}" Mar 17 19:06:39.800341 kubelet[2118]: E0317 19:06:39.800280 2118 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-9eb0e2b4dd?timeout=10s\": dial tcp 10.200.8.16:6443: connect: connection refused" interval="800ms" Mar 17 19:06:39.996218 kubelet[2118]: I0317 19:06:39.995755 2118 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:39.996218 kubelet[2118]: E0317 19:06:39.996144 2118 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.16:6443/api/v1/nodes\": dial tcp 10.200.8.16:6443: connect: connection refused" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:40.001224 kubelet[2118]: W0317 19:06:40.001112 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.16:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:40.001473 kubelet[2118]: E0317 19:06:40.001256 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.8.16:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:40.007907 kubelet[2118]: W0317 19:06:40.007877 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.16:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:40.008017 kubelet[2118]: E0317 19:06:40.007924 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.8.16:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:40.229358 kubelet[2118]: W0317 19:06:40.229303 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.16:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:40.229577 kubelet[2118]: E0317 19:06:40.229371 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.8.16:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:40.308065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2357289892.mount: Deactivated successfully. Mar 17 19:06:40.331113 env[1440]: time="2025-03-17T19:06:40.331046465Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.343421 env[1440]: time="2025-03-17T19:06:40.343368085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.347148 env[1440]: time="2025-03-17T19:06:40.347109652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.355525 env[1440]: time="2025-03-17T19:06:40.355477902Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.364385 env[1440]: time="2025-03-17T19:06:40.364349361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.368323 env[1440]: time="2025-03-17T19:06:40.368288232Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.372728 env[1440]: time="2025-03-17T19:06:40.372695411Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.376545 env[1440]: time="2025-03-17T19:06:40.376486279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.384386 env[1440]: time="2025-03-17T19:06:40.384343620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.393158 env[1440]: time="2025-03-17T19:06:40.393115877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.400492 env[1440]: time="2025-03-17T19:06:40.400442108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.424895 env[1440]: time="2025-03-17T19:06:40.424844345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:40.426591 env[1440]: time="2025-03-17T19:06:40.421191980Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:06:40.426591 env[1440]: time="2025-03-17T19:06:40.421231380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:06:40.426591 env[1440]: time="2025-03-17T19:06:40.421241881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:06:40.426591 env[1440]: time="2025-03-17T19:06:40.421403584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022 pid=2156 runtime=io.containerd.runc.v2 Mar 17 19:06:40.452701 systemd[1]: Started cri-containerd-83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022.scope. Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.473000 audit: BPF prog-id=62 op=LOAD Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833663663383361646431303061336332636461383266653733666435 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833663663383361646431303061336332636461383266653733666435 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit: BPF prog-id=63 op=LOAD Mar 17 19:06:40.474000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000390c00 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833663663383361646431303061336332636461383266653733666435 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit: BPF prog-id=64 op=LOAD Mar 17 19:06:40.474000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390c48 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833663663383361646431303061336332636461383266653733666435 Mar 17 19:06:40.474000 audit: BPF prog-id=64 op=UNLOAD Mar 17 19:06:40.474000 audit: BPF prog-id=63 op=UNLOAD Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.474000 audit: BPF prog-id=65 op=LOAD Mar 17 19:06:40.474000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000391058 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833663663383361646431303061336332636461383266653733666435 Mar 17 19:06:40.503348 env[1440]: time="2025-03-17T19:06:40.491781844Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:06:40.503348 env[1440]: time="2025-03-17T19:06:40.491827845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:06:40.503348 env[1440]: time="2025-03-17T19:06:40.491842946Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:06:40.503348 env[1440]: time="2025-03-17T19:06:40.492017149Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f123a2e4e34fda840bf8b32d3dcc24296d108896dd587bb81429c53da22c6b20 pid=2191 runtime=io.containerd.runc.v2 Mar 17 19:06:40.522776 env[1440]: time="2025-03-17T19:06:40.522696198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:06:40.523023 env[1440]: time="2025-03-17T19:06:40.522994104Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:06:40.523141 env[1440]: time="2025-03-17T19:06:40.523118506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:06:40.523408 env[1440]: time="2025-03-17T19:06:40.523375811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96488589129d9d62000468b22d0ccdd53f3cbdf9277af1b114a4b8c12e2f2579 pid=2210 runtime=io.containerd.runc.v2 Mar 17 19:06:40.528442 env[1440]: time="2025-03-17T19:06:40.528386700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd,Uid:bac41c33791804c1cb9908137d07c142,Namespace:kube-system,Attempt:0,} returns sandbox id \"83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022\"" Mar 17 19:06:40.532062 env[1440]: time="2025-03-17T19:06:40.531963864Z" level=info msg="CreateContainer within sandbox \"83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Mar 17 19:06:40.540100 systemd[1]: Started cri-containerd-f123a2e4e34fda840bf8b32d3dcc24296d108896dd587bb81429c53da22c6b20.scope. Mar 17 19:06:40.557411 systemd[1]: Started cri-containerd-96488589129d9d62000468b22d0ccdd53f3cbdf9277af1b114a4b8c12e2f2579.scope. Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.571000 audit: BPF prog-id=66 op=LOAD Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2191 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323361326534653334666461383430626638623332643364636332 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2191 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323361326534653334666461383430626638623332643364636332 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit: BPF prog-id=67 op=LOAD Mar 17 19:06:40.572000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028e400 items=0 ppid=2191 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323361326534653334666461383430626638623332643364636332 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit: BPF prog-id=68 op=LOAD Mar 17 19:06:40.572000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028e448 items=0 ppid=2191 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323361326534653334666461383430626638623332643364636332 Mar 17 19:06:40.572000 audit: BPF prog-id=68 op=UNLOAD Mar 17 19:06:40.572000 audit: BPF prog-id=67 op=UNLOAD Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.572000 audit: BPF prog-id=69 op=LOAD Mar 17 19:06:40.572000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028e858 items=0 ppid=2191 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631323361326534653334666461383430626638623332643364636332 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.578000 audit: BPF prog-id=70 op=LOAD Mar 17 19:06:40.579000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.579000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2210 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343838353839313239643964363230303034363862323264306363 Mar 17 19:06:40.579000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.579000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2210 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343838353839313239643964363230303034363862323264306363 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit: BPF prog-id=71 op=LOAD Mar 17 19:06:40.580000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000229040 items=0 ppid=2210 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343838353839313239643964363230303034363862323264306363 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit: BPF prog-id=72 op=LOAD Mar 17 19:06:40.580000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229088 items=0 ppid=2210 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343838353839313239643964363230303034363862323264306363 Mar 17 19:06:40.580000 audit: BPF prog-id=72 op=UNLOAD Mar 17 19:06:40.580000 audit: BPF prog-id=71 op=UNLOAD Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.580000 audit: BPF prog-id=73 op=LOAD Mar 17 19:06:40.580000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000229498 items=0 ppid=2210 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936343838353839313239643964363230303034363862323264306363 Mar 17 19:06:40.583697 kubelet[2118]: W0317 19:06:40.583577 2118 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.16:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-9eb0e2b4dd&limit=500&resourceVersion=0": dial tcp 10.200.8.16:6443: connect: connection refused Mar 17 19:06:40.583697 kubelet[2118]: E0317 19:06:40.583670 2118 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.8.16:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-a-9eb0e2b4dd&limit=500&resourceVersion=0\": dial tcp 10.200.8.16:6443: connect: connection refused" logger="UnhandledError" Mar 17 19:06:40.601417 kubelet[2118]: E0317 19:06:40.601338 2118 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.16:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-a-9eb0e2b4dd?timeout=10s\": dial tcp 10.200.8.16:6443: connect: connection refused" interval="1.6s" Mar 17 19:06:40.618637 env[1440]: time="2025-03-17T19:06:40.618579916Z" level=info msg="CreateContainer within sandbox \"83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b185182adfe50498ed2a72c530f8c2dcbc2ec7e0e3275348a6c83547c7ee5733\"" Mar 17 19:06:40.619499 env[1440]: time="2025-03-17T19:06:40.619470432Z" level=info msg="StartContainer for \"b185182adfe50498ed2a72c530f8c2dcbc2ec7e0e3275348a6c83547c7ee5733\"" Mar 17 19:06:40.630442 env[1440]: time="2025-03-17T19:06:40.630403428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd,Uid:0214ca1d3e9ae6e70f11f5ac3b90bf2a,Namespace:kube-system,Attempt:0,} returns sandbox id \"f123a2e4e34fda840bf8b32d3dcc24296d108896dd587bb81429c53da22c6b20\"" Mar 17 19:06:40.634463 env[1440]: time="2025-03-17T19:06:40.634437800Z" level=info msg="CreateContainer within sandbox \"f123a2e4e34fda840bf8b32d3dcc24296d108896dd587bb81429c53da22c6b20\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Mar 17 19:06:40.636511 env[1440]: time="2025-03-17T19:06:40.636478737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd,Uid:d5a847f8d4f467923b6614765788c58b,Namespace:kube-system,Attempt:0,} returns sandbox id \"96488589129d9d62000468b22d0ccdd53f3cbdf9277af1b114a4b8c12e2f2579\"" Mar 17 19:06:40.639372 env[1440]: time="2025-03-17T19:06:40.639339088Z" level=info msg="CreateContainer within sandbox \"96488589129d9d62000468b22d0ccdd53f3cbdf9277af1b114a4b8c12e2f2579\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Mar 17 19:06:40.652189 systemd[1]: Started cri-containerd-b185182adfe50498ed2a72c530f8c2dcbc2ec7e0e3275348a6c83547c7ee5733.scope. Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.670000 audit: BPF prog-id=74 op=LOAD Mar 17 19:06:40.671000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.671000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2156 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383531383261646665353034393865643261373263353330663863 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2156 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383531383261646665353034393865643261373263353330663863 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.672000 audit: BPF prog-id=75 op=LOAD Mar 17 19:06:40.672000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000259d10 items=0 ppid=2156 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383531383261646665353034393865643261373263353330663863 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.673000 audit: BPF prog-id=76 op=LOAD Mar 17 19:06:40.673000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000259d58 items=0 ppid=2156 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383531383261646665353034393865643261373263353330663863 Mar 17 19:06:40.674000 audit: BPF prog-id=76 op=UNLOAD Mar 17 19:06:40.674000 audit: BPF prog-id=75 op=UNLOAD Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.674000 audit: BPF prog-id=77 op=LOAD Mar 17 19:06:40.674000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000354168 items=0 ppid=2156 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383531383261646665353034393865643261373263353330663863 Mar 17 19:06:40.695517 env[1440]: time="2025-03-17T19:06:40.695472894Z" level=info msg="CreateContainer within sandbox \"f123a2e4e34fda840bf8b32d3dcc24296d108896dd587bb81429c53da22c6b20\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2b1719af275a6d712875fb50d1cae17b5cecf44cf21d74d81903f729d9928ede\"" Mar 17 19:06:40.696824 env[1440]: time="2025-03-17T19:06:40.696793118Z" level=info msg="StartContainer for \"2b1719af275a6d712875fb50d1cae17b5cecf44cf21d74d81903f729d9928ede\"" Mar 17 19:06:40.706807 env[1440]: time="2025-03-17T19:06:40.706761096Z" level=info msg="CreateContainer within sandbox \"96488589129d9d62000468b22d0ccdd53f3cbdf9277af1b114a4b8c12e2f2579\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2309a52671178d1674c21ae2ae4f97ad7dc90fab19b028f22b3e2b0fa2b8bc8b\"" Mar 17 19:06:40.707619 env[1440]: time="2025-03-17T19:06:40.707591611Z" level=info msg="StartContainer for \"2309a52671178d1674c21ae2ae4f97ad7dc90fab19b028f22b3e2b0fa2b8bc8b\"" Mar 17 19:06:40.722649 systemd[1]: Started cri-containerd-2b1719af275a6d712875fb50d1cae17b5cecf44cf21d74d81903f729d9928ede.scope. Mar 17 19:06:40.727786 env[1440]: time="2025-03-17T19:06:40.722927586Z" level=info msg="StartContainer for \"b185182adfe50498ed2a72c530f8c2dcbc2ec7e0e3275348a6c83547c7ee5733\" returns successfully" Mar 17 19:06:40.754155 systemd[1]: Started cri-containerd-2309a52671178d1674c21ae2ae4f97ad7dc90fab19b028f22b3e2b0fa2b8bc8b.scope. Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.771000 audit: BPF prog-id=78 op=LOAD Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2191 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313731396166323735613664373132383735666235306431636165 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2191 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313731396166323735613664373132383735666235306431636165 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit: BPF prog-id=79 op=LOAD Mar 17 19:06:40.773000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000b16f0 items=0 ppid=2191 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313731396166323735613664373132383735666235306431636165 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit: BPF prog-id=80 op=LOAD Mar 17 19:06:40.773000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000b1738 items=0 ppid=2191 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313731396166323735613664373132383735666235306431636165 Mar 17 19:06:40.773000 audit: BPF prog-id=80 op=UNLOAD Mar 17 19:06:40.773000 audit: BPF prog-id=79 op=UNLOAD Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.773000 audit: BPF prog-id=81 op=LOAD Mar 17 19:06:40.773000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000b1b48 items=0 ppid=2191 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262313731396166323735613664373132383735666235306431636165 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit: BPF prog-id=82 op=LOAD Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303961353236373131373864313637346332316165326165346639 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303961353236373131373864313637346332316165326165346639 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.799000 audit: BPF prog-id=83 op=LOAD Mar 17 19:06:40.799000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000259d00 items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303961353236373131373864313637346332316165326165346639 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit: BPF prog-id=84 op=LOAD Mar 17 19:06:40.800000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000259d48 items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303961353236373131373864313637346332316165326165346639 Mar 17 19:06:40.800000 audit: BPF prog-id=84 op=UNLOAD Mar 17 19:06:40.800000 audit: BPF prog-id=83 op=UNLOAD Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { perfmon } for pid=2337 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit[2337]: AVC avc: denied { bpf } for pid=2337 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:40.800000 audit: BPF prog-id=85 op=LOAD Mar 17 19:06:40.800000 audit[2337]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2158 items=0 ppid=2210 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303961353236373131373864313637346332316165326165346639 Mar 17 19:06:40.809318 kubelet[2118]: I0317 19:06:40.808929 2118 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:40.809855 kubelet[2118]: E0317 19:06:40.809815 2118 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.16:6443/api/v1/nodes\": dial tcp 10.200.8.16:6443: connect: connection refused" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:41.309678 systemd[1]: run-containerd-runc-k8s.io-83f6c83add100a3c2cda82fe73fd5b5ca468094ac60c346bb7290f2e7f751022-runc.XEc4pM.mount: Deactivated successfully. Mar 17 19:06:41.323189 env[1440]: time="2025-03-17T19:06:41.323139795Z" level=info msg="StartContainer for \"2b1719af275a6d712875fb50d1cae17b5cecf44cf21d74d81903f729d9928ede\" returns successfully" Mar 17 19:06:41.323590 env[1440]: time="2025-03-17T19:06:41.323516201Z" level=info msg="StartContainer for \"2309a52671178d1674c21ae2ae4f97ad7dc90fab19b028f22b3e2b0fa2b8bc8b\" returns successfully" Mar 17 19:06:42.413000 kubelet[2118]: I0317 19:06:42.412389 2118 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:42.490000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:42.496779 kernel: kauditd_printk_skb: 621 callbacks suppressed Mar 17 19:06:42.496898 kernel: audit: type=1400 audit(1742238402.490:538): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:42.490000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00098e060 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:42.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:42.560503 kernel: audit: type=1300 audit(1742238402.490:538): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00098e060 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:42.560684 kernel: audit: type=1327 audit(1742238402.490:538): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:42.515000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:42.605479 kernel: audit: type=1400 audit(1742238402.515:539): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:42.605648 kernel: audit: type=1300 audit(1742238402.515:539): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000414a40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:42.515000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000414a40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:42.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:42.627689 kernel: audit: type=1327 audit(1742238402.515:539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:43.233000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.252686 kernel: audit: type=1400 audit(1742238403.233:540): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.233000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039d8c60 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.305499 kernel: audit: type=1300 audit(1742238403.233:540): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039d8c60 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.305700 kernel: audit: type=1327 audit(1742238403.233:540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.233000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.233000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0042be780 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.233000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.233000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007ff49f0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.254000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.254000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c0039d9320 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.255000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.323691 kernel: audit: type=1400 audit(1742238403.233:541): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.255000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0042beb20 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.256000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:43.256000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c0039d9aa0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:06:43.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:06:43.407687 kubelet[2118]: E0317 19:06:43.407592 2118 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-a-9eb0e2b4dd\" not found" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:43.541466 kubelet[2118]: I0317 19:06:43.541324 2118 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:44.143560 kubelet[2118]: I0317 19:06:44.143496 2118 apiserver.go:52] "Watching apiserver" Mar 17 19:06:44.175078 kubelet[2118]: I0317 19:06:44.175010 2118 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 19:06:45.550446 systemd[1]: Reloading. Mar 17 19:06:45.651167 /usr/lib/systemd/system-generators/torcx-generator[2409]: time="2025-03-17T19:06:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 19:06:45.651715 /usr/lib/systemd/system-generators/torcx-generator[2409]: time="2025-03-17T19:06:45Z" level=info msg="torcx already run" Mar 17 19:06:45.747464 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 19:06:45.747484 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 19:06:45.764454 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.849000 audit: BPF prog-id=86 op=LOAD Mar 17 19:06:45.850000 audit: BPF prog-id=47 op=UNLOAD Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit: BPF prog-id=87 op=LOAD Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit: BPF prog-id=88 op=LOAD Mar 17 19:06:45.850000 audit: BPF prog-id=48 op=UNLOAD Mar 17 19:06:45.850000 audit: BPF prog-id=49 op=UNLOAD Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit: BPF prog-id=89 op=LOAD Mar 17 19:06:45.851000 audit: BPF prog-id=50 op=UNLOAD Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit: BPF prog-id=90 op=LOAD Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit: BPF prog-id=91 op=LOAD Mar 17 19:06:45.851000 audit: BPF prog-id=51 op=UNLOAD Mar 17 19:06:45.851000 audit: BPF prog-id=52 op=UNLOAD Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.852000 audit: BPF prog-id=92 op=LOAD Mar 17 19:06:45.852000 audit: BPF prog-id=70 op=UNLOAD Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit: BPF prog-id=93 op=LOAD Mar 17 19:06:45.854000 audit: BPF prog-id=62 op=UNLOAD Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.855000 audit: BPF prog-id=94 op=LOAD Mar 17 19:06:45.855000 audit: BPF prog-id=82 op=UNLOAD Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit: BPF prog-id=95 op=LOAD Mar 17 19:06:45.856000 audit: BPF prog-id=53 op=UNLOAD Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit: BPF prog-id=96 op=LOAD Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.856000 audit: BPF prog-id=97 op=LOAD Mar 17 19:06:45.856000 audit: BPF prog-id=54 op=UNLOAD Mar 17 19:06:45.856000 audit: BPF prog-id=55 op=UNLOAD Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit: BPF prog-id=98 op=LOAD Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.857000 audit: BPF prog-id=99 op=LOAD Mar 17 19:06:45.857000 audit: BPF prog-id=56 op=UNLOAD Mar 17 19:06:45.857000 audit: BPF prog-id=57 op=UNLOAD Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.859000 audit: BPF prog-id=100 op=LOAD Mar 17 19:06:45.860000 audit: BPF prog-id=58 op=UNLOAD Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.862000 audit: BPF prog-id=101 op=LOAD Mar 17 19:06:45.862000 audit: BPF prog-id=59 op=UNLOAD Mar 17 19:06:45.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit: BPF prog-id=102 op=LOAD Mar 17 19:06:45.864000 audit: BPF prog-id=60 op=UNLOAD Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.865000 audit: BPF prog-id=103 op=LOAD Mar 17 19:06:45.865000 audit: BPF prog-id=74 op=UNLOAD Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit: BPF prog-id=104 op=LOAD Mar 17 19:06:45.867000 audit: BPF prog-id=78 op=UNLOAD Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.867000 audit: BPF prog-id=105 op=LOAD Mar 17 19:06:45.867000 audit: BPF prog-id=61 op=UNLOAD Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:45.869000 audit: BPF prog-id=106 op=LOAD Mar 17 19:06:45.869000 audit: BPF prog-id=66 op=UNLOAD Mar 17 19:06:45.886553 systemd[1]: Stopping kubelet.service... Mar 17 19:06:45.907074 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 19:06:45.907285 systemd[1]: Stopped kubelet.service. Mar 17 19:06:45.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:45.909482 systemd[1]: Starting kubelet.service... Mar 17 19:06:46.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:46.158061 systemd[1]: Started kubelet.service. Mar 17 19:06:46.225008 kubelet[2476]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:06:46.225391 kubelet[2476]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 19:06:46.225434 kubelet[2476]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 19:06:46.225595 kubelet[2476]: I0317 19:06:46.225562 2476 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 19:06:46.234258 kubelet[2476]: I0317 19:06:46.234218 2476 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 19:06:46.234462 kubelet[2476]: I0317 19:06:46.234446 2476 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 19:06:46.234945 kubelet[2476]: I0317 19:06:46.234924 2476 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 19:06:46.236722 kubelet[2476]: I0317 19:06:46.236700 2476 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Mar 17 19:06:46.239176 kubelet[2476]: I0317 19:06:46.239157 2476 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 19:06:46.244871 kubelet[2476]: E0317 19:06:46.244841 2476 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 19:06:46.245004 kubelet[2476]: I0317 19:06:46.244992 2476 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 19:06:46.249405 kubelet[2476]: I0317 19:06:46.249384 2476 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 19:06:46.249616 kubelet[2476]: I0317 19:06:46.249606 2476 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 19:06:46.249826 kubelet[2476]: I0317 19:06:46.249791 2476 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 19:06:46.250057 kubelet[2476]: I0317 19:06:46.249886 2476 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-a-9eb0e2b4dd","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 19:06:46.250187 kubelet[2476]: I0317 19:06:46.250177 2476 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 19:06:46.250242 kubelet[2476]: I0317 19:06:46.250236 2476 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 19:06:46.250310 kubelet[2476]: I0317 19:06:46.250304 2476 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:06:46.250450 kubelet[2476]: I0317 19:06:46.250441 2476 kubelet.go:408] "Attempting to sync node with API server" Mar 17 19:06:46.250509 kubelet[2476]: I0317 19:06:46.250500 2476 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 19:06:46.250603 kubelet[2476]: I0317 19:06:46.250595 2476 kubelet.go:314] "Adding apiserver pod source" Mar 17 19:06:46.250685 kubelet[2476]: I0317 19:06:46.250675 2476 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 19:06:46.262687 kubelet[2476]: I0317 19:06:46.259140 2476 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 19:06:46.262687 kubelet[2476]: I0317 19:06:46.259760 2476 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 19:06:46.262687 kubelet[2476]: I0317 19:06:46.260308 2476 server.go:1269] "Started kubelet" Mar 17 19:06:46.267575 kubelet[2476]: I0317 19:06:46.267504 2476 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 19:06:46.268000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:46.268000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:46.268000 audit[2476]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00075d380 a1=c0007fbcc8 a2=c00075d350 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:46.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:46.268000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:46.268000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:46.268000 audit[2476]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00074e880 a1=c0007fbce0 a2=c00075d410 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:46.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.269453 2476 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.269512 2476 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.269561 2476 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.275849 2476 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.277556 2476 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.280033 2476 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.283168 2476 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.284247 2476 server.go:460] "Adding debug handlers to kubelet server" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.288102 2476 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.291091 2476 factory.go:221] Registration of the systemd container factory successfully Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.291220 2476 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.292789 2476 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.292811 2476 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 19:06:46.569268 kubelet[2476]: I0317 19:06:46.292829 2476 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 19:06:46.569983 kubelet[2476]: E0317 19:06:46.292892 2476 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 19:06:46.569983 kubelet[2476]: I0317 19:06:46.293549 2476 factory.go:221] Registration of the containerd container factory successfully Mar 17 19:06:46.569983 kubelet[2476]: I0317 19:06:46.339613 2476 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 19:06:46.569983 kubelet[2476]: I0317 19:06:46.339630 2476 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 19:06:46.569983 kubelet[2476]: I0317 19:06:46.339677 2476 state_mem.go:36] "Initialized new in-memory state store" Mar 17 19:06:46.569983 kubelet[2476]: E0317 19:06:46.393034 2476 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Mar 17 19:06:46.569983 kubelet[2476]: I0317 19:06:46.569305 2476 reconciler.go:26] "Reconciler: start to sync state" Mar 17 19:06:46.571323 kubelet[2476]: I0317 19:06:46.571296 2476 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 19:06:46.571905 kubelet[2476]: I0317 19:06:46.571879 2476 state_mem.go:88] "Updated default CPUSet" cpuSet="" Mar 17 19:06:46.572057 kubelet[2476]: I0317 19:06:46.572014 2476 state_mem.go:96] "Updated CPUSet assignments" assignments={} Mar 17 19:06:46.572159 kubelet[2476]: I0317 19:06:46.572148 2476 policy_none.go:49] "None policy: Start" Mar 17 19:06:46.577129 kubelet[2476]: I0317 19:06:46.575868 2476 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 19:06:46.577129 kubelet[2476]: I0317 19:06:46.575895 2476 state_mem.go:35] "Initializing new in-memory state store" Mar 17 19:06:46.577129 kubelet[2476]: I0317 19:06:46.576154 2476 state_mem.go:75] "Updated machine memory state" Mar 17 19:06:46.582101 kubelet[2476]: I0317 19:06:46.582065 2476 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 19:06:46.581000 audit[2476]: AVC avc: denied { mac_admin } for pid=2476 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:46.581000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 19:06:46.581000 audit[2476]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008b0b10 a1=c000bc41c8 a2=c0008b0ae0 a3=25 items=0 ppid=1 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:46.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 19:06:46.582510 kubelet[2476]: I0317 19:06:46.582134 2476 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 19:06:46.582510 kubelet[2476]: I0317 19:06:46.582291 2476 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 19:06:46.582510 kubelet[2476]: I0317 19:06:46.582306 2476 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 19:06:46.584108 kubelet[2476]: I0317 19:06:46.583301 2476 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 19:06:46.609482 kubelet[2476]: W0317 19:06:46.608901 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 19:06:46.613046 kubelet[2476]: W0317 19:06:46.612578 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 19:06:46.613046 kubelet[2476]: W0317 19:06:46.612914 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 19:06:46.691576 kubelet[2476]: I0317 19:06:46.691544 2476 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.704526 kubelet[2476]: I0317 19:06:46.704374 2476 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.704526 kubelet[2476]: I0317 19:06:46.704503 2476 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.770841 kubelet[2476]: I0317 19:06:46.770789 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771170 kubelet[2476]: I0317 19:06:46.771142 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771348 kubelet[2476]: I0317 19:06:46.771326 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771469 kubelet[2476]: I0317 19:06:46.771459 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0214ca1d3e9ae6e70f11f5ac3b90bf2a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"0214ca1d3e9ae6e70f11f5ac3b90bf2a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771563 kubelet[2476]: I0317 19:06:46.771538 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771700 kubelet[2476]: I0317 19:06:46.771685 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bac41c33791804c1cb9908137d07c142-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"bac41c33791804c1cb9908137d07c142\") " pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771830 kubelet[2476]: I0317 19:06:46.771815 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.771960 kubelet[2476]: I0317 19:06:46.771942 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:46.772073 kubelet[2476]: I0317 19:06:46.772060 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5a847f8d4f467923b6614765788c58b-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" (UID: \"d5a847f8d4f467923b6614765788c58b\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:47.257561 kubelet[2476]: I0317 19:06:47.257509 2476 apiserver.go:52] "Watching apiserver" Mar 17 19:06:47.280205 kubelet[2476]: I0317 19:06:47.280163 2476 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 19:06:47.330702 kubelet[2476]: W0317 19:06:47.330649 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 19:06:47.330920 kubelet[2476]: E0317 19:06:47.330758 2476 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:47.336316 kubelet[2476]: W0317 19:06:47.335287 2476 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 19:06:47.336523 kubelet[2476]: E0317 19:06:47.336501 2476 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:06:47.355572 kubelet[2476]: I0317 19:06:47.355505 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-a-9eb0e2b4dd" podStartSLOduration=1.355487532 podStartE2EDuration="1.355487532s" podCreationTimestamp="2025-03-17 19:06:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:06:47.33810407 +0000 UTC m=+1.172070647" watchObservedRunningTime="2025-03-17 19:06:47.355487532 +0000 UTC m=+1.189454209" Mar 17 19:06:47.366931 kubelet[2476]: I0317 19:06:47.366864 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-a-9eb0e2b4dd" podStartSLOduration=1.366842702 podStartE2EDuration="1.366842702s" podCreationTimestamp="2025-03-17 19:06:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:06:47.355874037 +0000 UTC m=+1.189840714" watchObservedRunningTime="2025-03-17 19:06:47.366842702 +0000 UTC m=+1.200809379" Mar 17 19:06:47.377642 kubelet[2476]: I0317 19:06:47.377577 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-a-9eb0e2b4dd" podStartSLOduration=1.377563364 podStartE2EDuration="1.377563364s" podCreationTimestamp="2025-03-17 19:06:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:06:47.367139807 +0000 UTC m=+1.201106484" watchObservedRunningTime="2025-03-17 19:06:47.377563364 +0000 UTC m=+1.211529941" Mar 17 19:06:48.968000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Mar 17 19:06:48.974012 kernel: kauditd_printk_skb: 272 callbacks suppressed Mar 17 19:06:48.974126 kernel: audit: type=1400 audit(1742238408.968:795): avc: denied { watch } for pid=2354 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7375 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Mar 17 19:06:48.968000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00104ca40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.013387 kernel: audit: type=1300 audit(1742238408.968:795): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00104ca40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.013564 kernel: audit: type=1327 audit(1742238408.968:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:48.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.167000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.167000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28820 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.207901 kernel: audit: type=1400 audit(1742238409.167:796): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.208036 kernel: audit: type=1300 audit(1742238409.167:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28820 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.208064 kernel: audit: type=1327 audit(1742238409.167:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.169000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.239872 kernel: audit: type=1400 audit(1742238409.169:797): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.240030 kernel: audit: type=1300 audit(1742238409.169:797): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28a40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.169000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28a40 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.278064 kernel: audit: type=1327 audit(1742238409.169:797): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.169000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.169000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b28c00 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.171000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:49.171000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00077c800 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:06:49.171000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:06:49.294681 kernel: audit: type=1400 audit(1742238409.169:798): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:06:50.130522 kubelet[2476]: I0317 19:06:50.130480 2476 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Mar 17 19:06:50.131142 env[1440]: time="2025-03-17T19:06:50.131055485Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 19:06:50.131479 kubelet[2476]: I0317 19:06:50.131376 2476 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Mar 17 19:06:51.158285 systemd[1]: Created slice kubepods-besteffort-pod601ff692_8e97_48b8_aaea_b74979fd5e49.slice. Mar 17 19:06:51.304069 kubelet[2476]: I0317 19:06:51.304008 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/601ff692-8e97-48b8-aaea-b74979fd5e49-kube-proxy\") pod \"kube-proxy-jsc2c\" (UID: \"601ff692-8e97-48b8-aaea-b74979fd5e49\") " pod="kube-system/kube-proxy-jsc2c" Mar 17 19:06:51.304069 kubelet[2476]: I0317 19:06:51.304069 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/601ff692-8e97-48b8-aaea-b74979fd5e49-xtables-lock\") pod \"kube-proxy-jsc2c\" (UID: \"601ff692-8e97-48b8-aaea-b74979fd5e49\") " pod="kube-system/kube-proxy-jsc2c" Mar 17 19:06:51.304670 kubelet[2476]: I0317 19:06:51.304101 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/601ff692-8e97-48b8-aaea-b74979fd5e49-lib-modules\") pod \"kube-proxy-jsc2c\" (UID: \"601ff692-8e97-48b8-aaea-b74979fd5e49\") " pod="kube-system/kube-proxy-jsc2c" Mar 17 19:06:51.304670 kubelet[2476]: I0317 19:06:51.304124 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qzhm6\" (UniqueName: \"kubernetes.io/projected/601ff692-8e97-48b8-aaea-b74979fd5e49-kube-api-access-qzhm6\") pod \"kube-proxy-jsc2c\" (UID: \"601ff692-8e97-48b8-aaea-b74979fd5e49\") " pod="kube-system/kube-proxy-jsc2c" Mar 17 19:06:51.493979 systemd[1]: Created slice kubepods-besteffort-podfa524dd3_1103_4af3_92ee_0e9560b61783.slice. Mar 17 19:06:51.557831 kubelet[2476]: I0317 19:06:51.557782 2476 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 19:06:51.605669 kubelet[2476]: I0317 19:06:51.605601 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fa524dd3-1103-4af3-92ee-0e9560b61783-var-lib-calico\") pod \"tigera-operator-76c4976dd7-bn2jn\" (UID: \"fa524dd3-1103-4af3-92ee-0e9560b61783\") " pod="tigera-operator/tigera-operator-76c4976dd7-bn2jn" Mar 17 19:06:51.606066 kubelet[2476]: I0317 19:06:51.606037 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lkdrw\" (UniqueName: \"kubernetes.io/projected/fa524dd3-1103-4af3-92ee-0e9560b61783-kube-api-access-lkdrw\") pod \"tigera-operator-76c4976dd7-bn2jn\" (UID: \"fa524dd3-1103-4af3-92ee-0e9560b61783\") " pod="tigera-operator/tigera-operator-76c4976dd7-bn2jn" Mar 17 19:06:51.767449 env[1440]: time="2025-03-17T19:06:51.766823530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jsc2c,Uid:601ff692-8e97-48b8-aaea-b74979fd5e49,Namespace:kube-system,Attempt:0,}" Mar 17 19:06:51.814229 env[1440]: time="2025-03-17T19:06:51.813885873Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:06:51.814229 env[1440]: time="2025-03-17T19:06:51.813990175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:06:51.814229 env[1440]: time="2025-03-17T19:06:51.814040976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:06:51.814694 env[1440]: time="2025-03-17T19:06:51.814612483Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d pid=2532 runtime=io.containerd.runc.v2 Mar 17 19:06:51.853275 systemd[1]: Started cri-containerd-b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d.scope. Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.001000 audit: BPF prog-id=107 op=LOAD Mar 17 19:06:52.002000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.002000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633430313536386339333539656337316131343530303931393364 Mar 17 19:06:52.002000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.002000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633430313536386339333539656337316131343530303931393364 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.003000 audit: BPF prog-id=108 op=LOAD Mar 17 19:06:52.003000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000250c0 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633430313536386339333539656337316131343530303931393364 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.004000 audit: BPF prog-id=109 op=LOAD Mar 17 19:06:52.004000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025108 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633430313536386339333539656337316131343530303931393364 Mar 17 19:06:52.004000 audit: BPF prog-id=109 op=UNLOAD Mar 17 19:06:52.004000 audit: BPF prog-id=108 op=UNLOAD Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.005000 audit: BPF prog-id=110 op=LOAD Mar 17 19:06:52.005000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025518 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633430313536386339333539656337316131343530303931393364 Mar 17 19:06:52.026232 env[1440]: time="2025-03-17T19:06:52.023899437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jsc2c,Uid:601ff692-8e97-48b8-aaea-b74979fd5e49,Namespace:kube-system,Attempt:0,} returns sandbox id \"b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d\"" Mar 17 19:06:52.030258 env[1440]: time="2025-03-17T19:06:52.030208421Z" level=info msg="CreateContainer within sandbox \"b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 19:06:52.088064 env[1440]: time="2025-03-17T19:06:52.087997093Z" level=info msg="CreateContainer within sandbox \"b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"385f9e4e8e61299e0a11ea977708cd6194ccf80b086056c1828ae2409f5cd010\"" Mar 17 19:06:52.089368 env[1440]: time="2025-03-17T19:06:52.089308110Z" level=info msg="StartContainer for \"385f9e4e8e61299e0a11ea977708cd6194ccf80b086056c1828ae2409f5cd010\"" Mar 17 19:06:52.098114 env[1440]: time="2025-03-17T19:06:52.098056827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-bn2jn,Uid:fa524dd3-1103-4af3-92ee-0e9560b61783,Namespace:tigera-operator,Attempt:0,}" Mar 17 19:06:52.138032 systemd[1]: Started cri-containerd-385f9e4e8e61299e0a11ea977708cd6194ccf80b086056c1828ae2409f5cd010.scope. Mar 17 19:06:52.165989 env[1440]: time="2025-03-17T19:06:52.165892033Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:06:52.166282 env[1440]: time="2025-03-17T19:06:52.166246837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:06:52.166434 env[1440]: time="2025-03-17T19:06:52.166405940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:06:52.166780 env[1440]: time="2025-03-17T19:06:52.166734144Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/991be59631a59619a6498b040be0243794cdc36c6421245110d863bf526fd3cd pid=2595 runtime=io.containerd.runc.v2 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f67600c73c8 items=0 ppid=2532 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356639653465386536313239396530613131656139373737303863 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.187000 audit: BPF prog-id=111 op=LOAD Mar 17 19:06:52.187000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00033a678 items=0 ppid=2532 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356639653465386536313239396530613131656139373737303863 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit: BPF prog-id=112 op=LOAD Mar 17 19:06:52.188000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00033a6c8 items=0 ppid=2532 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356639653465386536313239396530613131656139373737303863 Mar 17 19:06:52.188000 audit: BPF prog-id=112 op=UNLOAD Mar 17 19:06:52.188000 audit: BPF prog-id=111 op=UNLOAD Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.188000 audit: BPF prog-id=113 op=LOAD Mar 17 19:06:52.188000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00033a758 items=0 ppid=2532 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356639653465386536313239396530613131656139373737303863 Mar 17 19:06:52.194226 systemd[1]: Started cri-containerd-991be59631a59619a6498b040be0243794cdc36c6421245110d863bf526fd3cd.scope. Mar 17 19:06:52.229719 env[1440]: time="2025-03-17T19:06:52.229322180Z" level=info msg="StartContainer for \"385f9e4e8e61299e0a11ea977708cd6194ccf80b086056c1828ae2409f5cd010\" returns successfully" Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.249000 audit: BPF prog-id=114 op=LOAD Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2595 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939316265353936333161353936313961363439386230343062653032 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2595 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939316265353936333161353936313961363439386230343062653032 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit: BPF prog-id=115 op=LOAD Mar 17 19:06:52.250000 audit[2602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00022b040 items=0 ppid=2595 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939316265353936333161353936313961363439386230343062653032 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.250000 audit: BPF prog-id=116 op=LOAD Mar 17 19:06:52.250000 audit[2602]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00022b088 items=0 ppid=2595 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939316265353936333161353936313961363439386230343062653032 Mar 17 19:06:52.251000 audit: BPF prog-id=116 op=UNLOAD Mar 17 19:06:52.251000 audit: BPF prog-id=115 op=UNLOAD Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:52.251000 audit: BPF prog-id=117 op=LOAD Mar 17 19:06:52.251000 audit[2602]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00022b498 items=0 ppid=2595 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939316265353936333161353936313961363439386230343062653032 Mar 17 19:06:52.303142 env[1440]: time="2025-03-17T19:06:52.303088365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-bn2jn,Uid:fa524dd3-1103-4af3-92ee-0e9560b61783,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"991be59631a59619a6498b040be0243794cdc36c6421245110d863bf526fd3cd\"" Mar 17 19:06:52.307870 env[1440]: time="2025-03-17T19:06:52.307818728Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Mar 17 19:06:52.455000 audit[2684]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.455000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb25c0460 a2=0 a3=7ffcb25c044c items=0 ppid=2581 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 19:06:52.456000 audit[2685]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.456000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd55203e20 a2=0 a3=7ffd55203e0c items=0 ppid=2581 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 19:06:52.457000 audit[2686]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.457000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8e6e0fd0 a2=0 a3=7ffd8e6e0fbc items=0 ppid=2581 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 19:06:52.459000 audit[2687]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.459000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcea08e100 a2=0 a3=7ffcea08e0ec items=0 ppid=2581 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 19:06:52.460000 audit[2688]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.460000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf9e85fe0 a2=0 a3=7ffcf9e85fcc items=0 ppid=2581 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 19:06:52.462000 audit[2689]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.462000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfb7c6040 a2=0 a3=7ffcfb7c602c items=0 ppid=2581 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 19:06:52.567000 audit[2691]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.567000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd50ce0460 a2=0 a3=7ffd50ce044c items=0 ppid=2581 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 19:06:52.573837 systemd[1]: run-containerd-runc-k8s.io-b5c401568c9359ec71a145009193d168ec492c226f1914cea67199b7b925546d-runc.JM8cuk.mount: Deactivated successfully. Mar 17 19:06:52.574000 audit[2693]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.574000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdd9140bf0 a2=0 a3=7ffdd9140bdc items=0 ppid=2581 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 19:06:52.583000 audit[2696]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.583000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb9a0c8e0 a2=0 a3=7ffeb9a0c8cc items=0 ppid=2581 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 19:06:52.585000 audit[2697]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.585000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedd4d4fd0 a2=0 a3=7ffedd4d4fbc items=0 ppid=2581 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 19:06:52.590000 audit[2699]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.590000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1b5f99d0 a2=0 a3=7ffc1b5f99bc items=0 ppid=2581 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 19:06:52.592000 audit[2700]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.592000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec1dca10 a2=0 a3=7ffcec1dc9fc items=0 ppid=2581 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 19:06:52.596000 audit[2702]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.596000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb14f8710 a2=0 a3=7ffdb14f86fc items=0 ppid=2581 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 19:06:52.602000 audit[2705]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.602000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbf8bfb40 a2=0 a3=7ffdbf8bfb2c items=0 ppid=2581 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 19:06:52.604000 audit[2706]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.604000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcccf92a30 a2=0 a3=7ffcccf92a1c items=0 ppid=2581 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 19:06:52.608000 audit[2708]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.608000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2d41eb70 a2=0 a3=7fff2d41eb5c items=0 ppid=2581 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 19:06:52.610000 audit[2709]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.610000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe47c8bb90 a2=0 a3=7ffe47c8bb7c items=0 ppid=2581 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 19:06:52.616000 audit[2711]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.616000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc53aecdf0 a2=0 a3=7ffc53aecddc items=0 ppid=2581 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:06:52.628000 audit[2714]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.628000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5f461e80 a2=0 a3=7fff5f461e6c items=0 ppid=2581 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:06:52.633000 audit[2717]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.633000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd028b3f0 a2=0 a3=7ffdd028b3dc items=0 ppid=2581 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 19:06:52.635000 audit[2718]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.635000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe190ebf10 a2=0 a3=7ffe190ebefc items=0 ppid=2581 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 19:06:52.639000 audit[2720]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.639000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffffcd8a7d0 a2=0 a3=7ffffcd8a7bc items=0 ppid=2581 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:06:52.644000 audit[2723]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.644000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4f96a040 a2=0 a3=7ffd4f96a02c items=0 ppid=2581 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:06:52.646000 audit[2724]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.646000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd48400660 a2=0 a3=7ffd4840064c items=0 ppid=2581 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 19:06:52.650000 audit[2726]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 19:06:52.650000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe7abf0d20 a2=0 a3=7ffe7abf0d0c items=0 ppid=2581 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 19:06:52.805000 audit[2732]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:06:52.805000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff13be6970 a2=0 a3=7fff13be695c items=0 ppid=2581 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:06:52.848000 audit[2732]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:06:52.848000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff13be6970 a2=0 a3=7fff13be695c items=0 ppid=2581 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:06:52.851000 audit[2737]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.851000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff2796d800 a2=0 a3=7fff2796d7ec items=0 ppid=2581 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 19:06:52.854000 audit[2739]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.854000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc36622d20 a2=0 a3=7ffc36622d0c items=0 ppid=2581 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 19:06:52.858000 audit[2742]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.858000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffff73aa690 a2=0 a3=7ffff73aa67c items=0 ppid=2581 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 19:06:52.859000 audit[2743]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.859000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1dce23c0 a2=0 a3=7ffe1dce23ac items=0 ppid=2581 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 19:06:52.862000 audit[2745]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.862000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc32bb2550 a2=0 a3=7ffc32bb253c items=0 ppid=2581 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 19:06:52.863000 audit[2746]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.863000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc4a21140 a2=0 a3=7ffdc4a2112c items=0 ppid=2581 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 19:06:52.866000 audit[2748]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.866000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc7aa8250 a2=0 a3=7ffdc7aa823c items=0 ppid=2581 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 19:06:52.870000 audit[2751]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.870000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe130b4d00 a2=0 a3=7ffe130b4cec items=0 ppid=2581 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 19:06:52.871000 audit[2752]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.871000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdad6bab40 a2=0 a3=7ffdad6bab2c items=0 ppid=2581 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 19:06:52.874000 audit[2754]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.874000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbc71b980 a2=0 a3=7ffdbc71b96c items=0 ppid=2581 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 19:06:52.875000 audit[2755]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.875000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf4aa73b0 a2=0 a3=7ffdf4aa739c items=0 ppid=2581 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 19:06:52.878000 audit[2757]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.878000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb7f15fa0 a2=0 a3=7ffcb7f15f8c items=0 ppid=2581 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 19:06:52.882000 audit[2760]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.882000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd23c26d50 a2=0 a3=7ffd23c26d3c items=0 ppid=2581 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 19:06:52.886000 audit[2763]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.886000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe422a18b0 a2=0 a3=7ffe422a189c items=0 ppid=2581 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 19:06:52.888000 audit[2764]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.888000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcf63a5840 a2=0 a3=7ffcf63a582c items=0 ppid=2581 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 19:06:52.890000 audit[2766]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.890000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc77843200 a2=0 a3=7ffc778431ec items=0 ppid=2581 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:06:52.894000 audit[2769]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.894000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffce2f46c40 a2=0 a3=7ffce2f46c2c items=0 ppid=2581 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 19:06:52.895000 audit[2770]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.895000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea0b17bc0 a2=0 a3=7ffea0b17bac items=0 ppid=2581 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 19:06:52.898000 audit[2772]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.898000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe12b33e80 a2=0 a3=7ffe12b33e6c items=0 ppid=2581 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 19:06:52.899000 audit[2773]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.899000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe76ff2470 a2=0 a3=7ffe76ff245c items=0 ppid=2581 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 19:06:52.902000 audit[2775]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.902000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd952c87f0 a2=0 a3=7ffd952c87dc items=0 ppid=2581 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:06:52.905000 audit[2778]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 19:06:52.905000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd10963f70 a2=0 a3=7ffd10963f5c items=0 ppid=2581 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 19:06:52.908000 audit[2780]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 19:06:52.908000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd5b574170 a2=0 a3=7ffd5b57415c items=0 ppid=2581 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.908000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:06:52.909000 audit[2780]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 19:06:52.909000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd5b574170 a2=0 a3=7ffd5b57415c items=0 ppid=2581 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:52.909000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:06:53.789764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2439556872.mount: Deactivated successfully. Mar 17 19:06:54.849403 sudo[1859]: pam_unix(sudo:session): session closed for user root Mar 17 19:06:54.848000 audit[1859]: USER_END pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:54.854413 kernel: kauditd_printk_skb: 315 callbacks suppressed Mar 17 19:06:54.854534 kernel: audit: type=1106 audit(1742238414.848:893): pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:54.848000 audit[1859]: CRED_DISP pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:54.884902 kernel: audit: type=1104 audit(1742238414.848:894): pid=1859 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 19:06:54.955049 sshd[1856]: pam_unix(sshd:session): session closed for user core Mar 17 19:06:54.956000 audit[1856]: USER_END pid=1856 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:54.958823 systemd[1]: sshd@6-10.200.8.16:22-10.200.16.10:46324.service: Deactivated successfully. Mar 17 19:06:54.959597 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 19:06:54.959772 systemd[1]: session-9.scope: Consumed 4.154s CPU time. Mar 17 19:06:54.961249 systemd-logind[1424]: Session 9 logged out. Waiting for processes to exit. Mar 17 19:06:54.962343 systemd-logind[1424]: Removed session 9. Mar 17 19:06:54.956000 audit[1856]: CRED_DISP pid=1856 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:54.975679 kernel: audit: type=1106 audit(1742238414.956:895): pid=1856 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:54.975724 kernel: audit: type=1104 audit(1742238414.956:896): pid=1856 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:06:54.990769 kernel: audit: type=1131 audit(1742238414.958:897): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.16:22-10.200.16.10:46324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:54.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.16:22-10.200.16.10:46324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:06:57.069070 kubelet[2476]: I0317 19:06:57.068989 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jsc2c" podStartSLOduration=6.068965224 podStartE2EDuration="6.068965224s" podCreationTimestamp="2025-03-17 19:06:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:06:52.348810175 +0000 UTC m=+6.182776752" watchObservedRunningTime="2025-03-17 19:06:57.068965224 +0000 UTC m=+10.902931801" Mar 17 19:06:58.645632 env[1440]: time="2025-03-17T19:06:58.645569927Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:58.653585 env[1440]: time="2025-03-17T19:06:58.653531520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:58.659226 env[1440]: time="2025-03-17T19:06:58.659179186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:58.665100 env[1440]: time="2025-03-17T19:06:58.665045054Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:06:58.665678 env[1440]: time="2025-03-17T19:06:58.665621061Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Mar 17 19:06:58.669617 env[1440]: time="2025-03-17T19:06:58.669583207Z" level=info msg="CreateContainer within sandbox \"991be59631a59619a6498b040be0243794cdc36c6421245110d863bf526fd3cd\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Mar 17 19:06:58.714643 env[1440]: time="2025-03-17T19:06:58.714586531Z" level=info msg="CreateContainer within sandbox \"991be59631a59619a6498b040be0243794cdc36c6421245110d863bf526fd3cd\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dfbc9aa6a8c85be02325d550c8e38e20faa1fbdafe17f1336db979720c28c80a\"" Mar 17 19:06:58.715716 env[1440]: time="2025-03-17T19:06:58.715648843Z" level=info msg="StartContainer for \"dfbc9aa6a8c85be02325d550c8e38e20faa1fbdafe17f1336db979720c28c80a\"" Mar 17 19:06:58.748863 systemd[1]: Started cri-containerd-dfbc9aa6a8c85be02325d550c8e38e20faa1fbdafe17f1336db979720c28c80a.scope. Mar 17 19:06:58.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.793022 kernel: audit: type=1400 audit(1742238418.764:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.793213 kernel: audit: type=1400 audit(1742238418.764:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.807099 kernel: audit: type=1400 audit(1742238418.766:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.821716 kernel: audit: type=1400 audit(1742238418.766:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.836902 kernel: audit: type=1400 audit(1742238418.766:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.778000 audit: BPF prog-id=118 op=LOAD Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2595 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:58.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626339616136613863383562653032333235643535306338653338 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2595 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:58.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626339616136613863383562653032333235643535306338653338 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.779000 audit: BPF prog-id=119 op=LOAD Mar 17 19:06:58.779000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000218480 items=0 ppid=2595 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:58.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626339616136613863383562653032333235643535306338653338 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit: BPF prog-id=120 op=LOAD Mar 17 19:06:58.792000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002184c8 items=0 ppid=2595 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:58.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626339616136613863383562653032333235643535306338653338 Mar 17 19:06:58.792000 audit: BPF prog-id=120 op=UNLOAD Mar 17 19:06:58.792000 audit: BPF prog-id=119 op=UNLOAD Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:06:58.792000 audit: BPF prog-id=121 op=LOAD Mar 17 19:06:58.792000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0002188d8 items=0 ppid=2595 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:06:58.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466626339616136613863383562653032333235643535306338653338 Mar 17 19:06:58.842804 env[1440]: time="2025-03-17T19:06:58.842750924Z" level=info msg="StartContainer for \"dfbc9aa6a8c85be02325d550c8e38e20faa1fbdafe17f1336db979720c28c80a\" returns successfully" Mar 17 19:06:59.699389 systemd[1]: run-containerd-runc-k8s.io-dfbc9aa6a8c85be02325d550c8e38e20faa1fbdafe17f1336db979720c28c80a-runc.xn39FN.mount: Deactivated successfully. Mar 17 19:07:01.748000 audit[2837]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.754210 kernel: kauditd_printk_skb: 52 callbacks suppressed Mar 17 19:07:01.754333 kernel: audit: type=1325 audit(1742238421.748:916): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.748000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc52348250 a2=0 a3=7ffc5234823c items=0 ppid=2581 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.784795 kernel: audit: type=1300 audit(1742238421.748:916): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc52348250 a2=0 a3=7ffc5234823c items=0 ppid=2581 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.784950 kernel: audit: type=1327 audit(1742238421.748:916): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.767000 audit[2837]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.804842 kernel: audit: type=1325 audit(1742238421.767:917): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.807684 kernel: audit: type=1300 audit(1742238421.767:917): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc52348250 a2=0 a3=0 items=0 ppid=2581 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.767000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc52348250 a2=0 a3=0 items=0 ppid=2581 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.824241 kernel: audit: type=1327 audit(1742238421.767:917): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.838000 audit[2839]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.838000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd3bc16a30 a2=0 a3=7ffd3bc16a1c items=0 ppid=2581 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.870705 kernel: audit: type=1325 audit(1742238421.838:918): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.870890 kernel: audit: type=1300 audit(1742238421.838:918): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd3bc16a30 a2=0 a3=7ffd3bc16a1c items=0 ppid=2581 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.883677 kernel: audit: type=1327 audit(1742238421.838:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.884000 audit[2839]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.895688 kernel: audit: type=1325 audit(1742238421.884:919): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:01.884000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd3bc16a30 a2=0 a3=0 items=0 ppid=2581 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:01.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:01.923166 kubelet[2476]: I0317 19:07:01.923088 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-bn2jn" podStartSLOduration=4.5632566 podStartE2EDuration="10.923066158s" podCreationTimestamp="2025-03-17 19:06:51 +0000 UTC" firstStartedPulling="2025-03-17 19:06:52.306986417 +0000 UTC m=+6.140953094" lastFinishedPulling="2025-03-17 19:06:58.666796075 +0000 UTC m=+12.500762652" observedRunningTime="2025-03-17 19:06:59.359238748 +0000 UTC m=+13.193205425" watchObservedRunningTime="2025-03-17 19:07:01.923066158 +0000 UTC m=+15.757032835" Mar 17 19:07:01.931873 systemd[1]: Created slice kubepods-besteffort-podf702011e_eccb_4c9a_ac83_cc4c53bf129f.slice. Mar 17 19:07:01.975069 kubelet[2476]: I0317 19:07:01.974984 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f702011e-eccb-4c9a-ac83-cc4c53bf129f-tigera-ca-bundle\") pod \"calico-typha-fb945c6c4-992fg\" (UID: \"f702011e-eccb-4c9a-ac83-cc4c53bf129f\") " pod="calico-system/calico-typha-fb945c6c4-992fg" Mar 17 19:07:01.975069 kubelet[2476]: I0317 19:07:01.975037 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f702011e-eccb-4c9a-ac83-cc4c53bf129f-typha-certs\") pod \"calico-typha-fb945c6c4-992fg\" (UID: \"f702011e-eccb-4c9a-ac83-cc4c53bf129f\") " pod="calico-system/calico-typha-fb945c6c4-992fg" Mar 17 19:07:01.975069 kubelet[2476]: I0317 19:07:01.975078 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6phdj\" (UniqueName: \"kubernetes.io/projected/f702011e-eccb-4c9a-ac83-cc4c53bf129f-kube-api-access-6phdj\") pod \"calico-typha-fb945c6c4-992fg\" (UID: \"f702011e-eccb-4c9a-ac83-cc4c53bf129f\") " pod="calico-system/calico-typha-fb945c6c4-992fg" Mar 17 19:07:02.125637 systemd[1]: Created slice kubepods-besteffort-podcfddcb55_a95b_49cd_b918_cc15341e8079.slice. Mar 17 19:07:02.238926 env[1440]: time="2025-03-17T19:07:02.238874547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fb945c6c4-992fg,Uid:f702011e-eccb-4c9a-ac83-cc4c53bf129f,Namespace:calico-system,Attempt:0,}" Mar 17 19:07:02.257827 kubelet[2476]: E0317 19:07:02.257756 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:02.280268 kubelet[2476]: I0317 19:07:02.278412 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-policysync\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280268 kubelet[2476]: I0317 19:07:02.278463 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-cni-bin-dir\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280268 kubelet[2476]: I0317 19:07:02.278490 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-cni-net-dir\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280268 kubelet[2476]: I0317 19:07:02.278517 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-var-lib-calico\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280268 kubelet[2476]: I0317 19:07:02.278541 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-cni-log-dir\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280631 kubelet[2476]: I0317 19:07:02.278565 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-flexvol-driver-host\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280631 kubelet[2476]: I0317 19:07:02.278591 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mjr7q\" (UniqueName: \"kubernetes.io/projected/cfddcb55-a95b-49cd-b918-cc15341e8079-kube-api-access-mjr7q\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280631 kubelet[2476]: I0317 19:07:02.278614 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cfddcb55-a95b-49cd-b918-cc15341e8079-tigera-ca-bundle\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280631 kubelet[2476]: I0317 19:07:02.278637 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-var-run-calico\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280631 kubelet[2476]: I0317 19:07:02.278677 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-lib-modules\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280834 kubelet[2476]: I0317 19:07:02.278701 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cfddcb55-a95b-49cd-b918-cc15341e8079-node-certs\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.280834 kubelet[2476]: I0317 19:07:02.278729 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cfddcb55-a95b-49cd-b918-cc15341e8079-xtables-lock\") pod \"calico-node-m8pln\" (UID: \"cfddcb55-a95b-49cd-b918-cc15341e8079\") " pod="calico-system/calico-node-m8pln" Mar 17 19:07:02.289611 env[1440]: time="2025-03-17T19:07:02.289116984Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:02.289611 env[1440]: time="2025-03-17T19:07:02.289205885Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:02.289611 env[1440]: time="2025-03-17T19:07:02.289234985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:02.289611 env[1440]: time="2025-03-17T19:07:02.289500388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508 pid=2849 runtime=io.containerd.runc.v2 Mar 17 19:07:02.323812 systemd[1]: Started cri-containerd-1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508.scope. Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.380000 audit: BPF prog-id=122 op=LOAD Mar 17 19:07:02.382794 kubelet[2476]: I0317 19:07:02.381589 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/305fb96c-f6b0-4e24-9c8d-d76d5088c95d-kubelet-dir\") pod \"csi-node-driver-r26l7\" (UID: \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\") " pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:02.382794 kubelet[2476]: I0317 19:07:02.381635 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/305fb96c-f6b0-4e24-9c8d-d76d5088c95d-registration-dir\") pod \"csi-node-driver-r26l7\" (UID: \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\") " pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:02.382794 kubelet[2476]: I0317 19:07:02.381687 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/305fb96c-f6b0-4e24-9c8d-d76d5088c95d-varrun\") pod \"csi-node-driver-r26l7\" (UID: \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\") " pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:02.382794 kubelet[2476]: I0317 19:07:02.381739 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/305fb96c-f6b0-4e24-9c8d-d76d5088c95d-socket-dir\") pod \"csi-node-driver-r26l7\" (UID: \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\") " pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:02.382794 kubelet[2476]: I0317 19:07:02.381847 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cb8j2\" (UniqueName: \"kubernetes.io/projected/305fb96c-f6b0-4e24-9c8d-d76d5088c95d-kube-api-access-cb8j2\") pod \"csi-node-driver-r26l7\" (UID: \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\") " pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:02.385135 kubelet[2476]: E0317 19:07:02.385100 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.385135 kubelet[2476]: W0317 19:07:02.385132 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.385302 kubelet[2476]: E0317 19:07:02.385169 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.387237 kubelet[2476]: E0317 19:07:02.387206 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.387237 kubelet[2476]: W0317 19:07:02.387231 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.387408 kubelet[2476]: E0317 19:07:02.387359 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.387942 kubelet[2476]: E0317 19:07:02.387916 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.388040 kubelet[2476]: W0317 19:07:02.387943 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.388105 kubelet[2476]: E0317 19:07:02.388041 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.388212 kubelet[2476]: E0317 19:07:02.388175 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.388212 kubelet[2476]: W0317 19:07:02.388192 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.388357 kubelet[2476]: E0317 19:07:02.388301 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.388449 kubelet[2476]: E0317 19:07:02.388433 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.388521 kubelet[2476]: W0317 19:07:02.388449 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.388583 kubelet[2476]: E0317 19:07:02.388534 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.388701 kubelet[2476]: E0317 19:07:02.388684 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.388701 kubelet[2476]: W0317 19:07:02.388700 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.388808 kubelet[2476]: E0317 19:07:02.388794 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.388986 kubelet[2476]: E0317 19:07:02.388965 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.388986 kubelet[2476]: W0317 19:07:02.388980 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.389127 kubelet[2476]: E0317 19:07:02.388998 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.389210 kubelet[2476]: E0317 19:07:02.389194 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.389275 kubelet[2476]: W0317 19:07:02.389210 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.389275 kubelet[2476]: E0317 19:07:02.389228 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.389530 kubelet[2476]: E0317 19:07:02.389497 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.389530 kubelet[2476]: W0317 19:07:02.389516 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.389676 kubelet[2476]: E0317 19:07:02.389535 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.389765 kubelet[2476]: E0317 19:07:02.389748 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.389832 kubelet[2476]: W0317 19:07:02.389766 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.389832 kubelet[2476]: E0317 19:07:02.389784 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.390023 kubelet[2476]: E0317 19:07:02.389992 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.390023 kubelet[2476]: W0317 19:07:02.390009 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.390141 kubelet[2476]: E0317 19:07:02.390026 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.390305 kubelet[2476]: E0317 19:07:02.390271 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.390305 kubelet[2476]: W0317 19:07:02.390294 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.390415 kubelet[2476]: E0317 19:07:02.390314 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.390571 kubelet[2476]: E0317 19:07:02.390543 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.390571 kubelet[2476]: W0317 19:07:02.390560 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.390727 kubelet[2476]: E0317 19:07:02.390574 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.390791 kubelet[2476]: E0317 19:07:02.390776 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.390791 kubelet[2476]: W0317 19:07:02.390788 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.390899 kubelet[2476]: E0317 19:07:02.390802 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.391052 kubelet[2476]: E0317 19:07:02.391009 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.391052 kubelet[2476]: W0317 19:07:02.391021 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.391052 kubelet[2476]: E0317 19:07:02.391035 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.391000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.391000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2849 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636565666534626232323537633535383735393964643634383634 Mar 17 19:07:02.391000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.391000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2849 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636565666534626232323537633535383735393964643634383634 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.392000 audit: BPF prog-id=123 op=LOAD Mar 17 19:07:02.392000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284eb0 items=0 ppid=2849 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636565666534626232323537633535383735393964643634383634 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.393000 audit: BPF prog-id=124 op=LOAD Mar 17 19:07:02.393000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000284ef8 items=0 ppid=2849 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636565666534626232323537633535383735393964643634383634 Mar 17 19:07:02.394000 audit: BPF prog-id=124 op=UNLOAD Mar 17 19:07:02.394000 audit: BPF prog-id=123 op=UNLOAD Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.394000 audit: BPF prog-id=125 op=LOAD Mar 17 19:07:02.394000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000285308 items=0 ppid=2849 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166636565666534626232323537633535383735393964643634383634 Mar 17 19:07:02.396694 kubelet[2476]: E0317 19:07:02.396679 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.396793 kubelet[2476]: W0317 19:07:02.396780 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.396882 kubelet[2476]: E0317 19:07:02.396871 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.404007 kubelet[2476]: E0317 19:07:02.403987 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.404210 kubelet[2476]: W0317 19:07:02.404194 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.404306 kubelet[2476]: E0317 19:07:02.404295 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.432135 env[1440]: time="2025-03-17T19:07:02.431955208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m8pln,Uid:cfddcb55-a95b-49cd-b918-cc15341e8079,Namespace:calico-system,Attempt:0,}" Mar 17 19:07:02.446847 env[1440]: time="2025-03-17T19:07:02.446800367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fb945c6c4-992fg,Uid:f702011e-eccb-4c9a-ac83-cc4c53bf129f,Namespace:calico-system,Attempt:0,} returns sandbox id \"1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508\"" Mar 17 19:07:02.448804 env[1440]: time="2025-03-17T19:07:02.448768388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 19:07:02.482609 kubelet[2476]: E0317 19:07:02.482570 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.482955 kubelet[2476]: W0317 19:07:02.482926 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.483091 kubelet[2476]: E0317 19:07:02.483073 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.483506 kubelet[2476]: E0317 19:07:02.483492 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.483610 kubelet[2476]: W0317 19:07:02.483596 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.483711 kubelet[2476]: E0317 19:07:02.483699 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.484070 kubelet[2476]: E0317 19:07:02.484056 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.484190 kubelet[2476]: W0317 19:07:02.484176 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.484326 kubelet[2476]: E0317 19:07:02.484302 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.484766 kubelet[2476]: E0317 19:07:02.484751 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.484878 kubelet[2476]: W0317 19:07:02.484866 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.484967 kubelet[2476]: E0317 19:07:02.484954 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.485430 kubelet[2476]: E0317 19:07:02.485410 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.487145 kubelet[2476]: W0317 19:07:02.487125 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.487271 kubelet[2476]: E0317 19:07:02.487257 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.487586 kubelet[2476]: E0317 19:07:02.487572 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.487694 kubelet[2476]: W0317 19:07:02.487680 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.487777 kubelet[2476]: E0317 19:07:02.487765 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.488043 kubelet[2476]: E0317 19:07:02.488031 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.488150 kubelet[2476]: W0317 19:07:02.488136 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.488232 kubelet[2476]: E0317 19:07:02.488221 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.488537 kubelet[2476]: E0317 19:07:02.488524 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.488647 kubelet[2476]: W0317 19:07:02.488632 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.488793 kubelet[2476]: E0317 19:07:02.488780 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.489087 kubelet[2476]: E0317 19:07:02.489073 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.489191 kubelet[2476]: W0317 19:07:02.489177 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.489311 kubelet[2476]: E0317 19:07:02.489293 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.489610 kubelet[2476]: E0317 19:07:02.489596 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.489759 kubelet[2476]: W0317 19:07:02.489744 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.489854 kubelet[2476]: E0317 19:07:02.489841 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.490202 kubelet[2476]: E0317 19:07:02.490189 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.490307 kubelet[2476]: W0317 19:07:02.490293 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.490409 kubelet[2476]: E0317 19:07:02.490396 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.490809 kubelet[2476]: E0317 19:07:02.490794 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.492560 kubelet[2476]: W0317 19:07:02.492538 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.492753 kubelet[2476]: E0317 19:07:02.492737 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.494630 kubelet[2476]: E0317 19:07:02.494502 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.494630 kubelet[2476]: W0317 19:07:02.494516 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.494630 kubelet[2476]: E0317 19:07:02.494531 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.494819 kubelet[2476]: E0317 19:07:02.494781 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.494819 kubelet[2476]: W0317 19:07:02.494794 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.494819 kubelet[2476]: E0317 19:07:02.494808 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.495097 kubelet[2476]: E0317 19:07:02.495077 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.495169 kubelet[2476]: W0317 19:07:02.495105 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.495223 kubelet[2476]: E0317 19:07:02.495205 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.495395 kubelet[2476]: E0317 19:07:02.495378 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.495395 kubelet[2476]: W0317 19:07:02.495394 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.495532 kubelet[2476]: E0317 19:07:02.495515 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.495739 kubelet[2476]: E0317 19:07:02.495722 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.495811 kubelet[2476]: W0317 19:07:02.495738 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.495876 kubelet[2476]: E0317 19:07:02.495843 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.496017 kubelet[2476]: E0317 19:07:02.496001 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.496017 kubelet[2476]: W0317 19:07:02.496017 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.496124 kubelet[2476]: E0317 19:07:02.496107 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496262 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.499155 kubelet[2476]: W0317 19:07:02.496279 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496401 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496553 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.499155 kubelet[2476]: W0317 19:07:02.496564 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496584 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496815 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.499155 kubelet[2476]: W0317 19:07:02.496825 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.496842 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499155 kubelet[2476]: E0317 19:07:02.497057 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.499693 kubelet[2476]: W0317 19:07:02.497067 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.499693 kubelet[2476]: E0317 19:07:02.497089 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499693 kubelet[2476]: E0317 19:07:02.497344 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.499693 kubelet[2476]: W0317 19:07:02.497363 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.499693 kubelet[2476]: E0317 19:07:02.497381 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.499954 kubelet[2476]: E0317 19:07:02.499934 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.500006 kubelet[2476]: W0317 19:07:02.499955 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.500006 kubelet[2476]: E0317 19:07:02.499970 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.500371 kubelet[2476]: E0317 19:07:02.500352 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.500371 kubelet[2476]: W0317 19:07:02.500370 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.500496 kubelet[2476]: E0317 19:07:02.500391 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.501208 env[1440]: time="2025-03-17T19:07:02.501114747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:02.501483 env[1440]: time="2025-03-17T19:07:02.501431250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:02.501596 env[1440]: time="2025-03-17T19:07:02.501558351Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:02.502379 env[1440]: time="2025-03-17T19:07:02.502316959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2 pid=2922 runtime=io.containerd.runc.v2 Mar 17 19:07:02.521836 kubelet[2476]: E0317 19:07:02.521792 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:02.521836 kubelet[2476]: W0317 19:07:02.521819 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:02.522119 kubelet[2476]: E0317 19:07:02.521849 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:02.537028 systemd[1]: Started cri-containerd-ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2.scope. Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.563000 audit: BPF prog-id=126 op=LOAD Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396435323139623736353339346165303933323036353530633738 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396435323139623736353339346165303933323036353530633738 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.565000 audit: BPF prog-id=127 op=LOAD Mar 17 19:07:02.565000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e3ce0 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396435323139623736353339346165303933323036353530633738 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.566000 audit: BPF prog-id=128 op=LOAD Mar 17 19:07:02.566000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e3d28 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396435323139623736353339346165303933323036353530633738 Mar 17 19:07:02.567000 audit: BPF prog-id=128 op=UNLOAD Mar 17 19:07:02.567000 audit: BPF prog-id=127 op=UNLOAD Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:02.567000 audit: BPF prog-id=129 op=LOAD Mar 17 19:07:02.567000 audit[2946]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034e138 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564396435323139623736353339346165303933323036353530633738 Mar 17 19:07:02.584581 env[1440]: time="2025-03-17T19:07:02.584518837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m8pln,Uid:cfddcb55-a95b-49cd-b918-cc15341e8079,Namespace:calico-system,Attempt:0,} returns sandbox id \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\"" Mar 17 19:07:02.908000 audit[2971]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:02.908000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe6f677350 a2=0 a3=7ffe6f67733c items=0 ppid=2581 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:02.911000 audit[2971]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:02.911000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe6f677350 a2=0 a3=0 items=0 ppid=2581 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:02.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:03.090352 systemd[1]: run-containerd-runc-k8s.io-1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508-runc.2DhRPn.mount: Deactivated successfully. Mar 17 19:07:04.098304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3615507224.mount: Deactivated successfully. Mar 17 19:07:04.295473 kubelet[2476]: E0317 19:07:04.293890 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:05.445403 env[1440]: time="2025-03-17T19:07:05.445338320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:05.451768 env[1440]: time="2025-03-17T19:07:05.451727584Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:05.456127 env[1440]: time="2025-03-17T19:07:05.456096828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:05.462772 env[1440]: time="2025-03-17T19:07:05.462735994Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:05.463474 env[1440]: time="2025-03-17T19:07:05.463441901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Mar 17 19:07:05.465329 env[1440]: time="2025-03-17T19:07:05.465300820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 19:07:05.483012 env[1440]: time="2025-03-17T19:07:05.482970297Z" level=info msg="CreateContainer within sandbox \"1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 19:07:05.516854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1603844433.mount: Deactivated successfully. Mar 17 19:07:05.532570 env[1440]: time="2025-03-17T19:07:05.532516394Z" level=info msg="CreateContainer within sandbox \"1fceefe4bb2257c5587599dd6486474df92056ecaa99a982296a5af0f2975508\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ef59427906dd3db82053222257d15920ee332ccee6a9a1d0acd7dde4f806c2e0\"" Mar 17 19:07:05.533624 env[1440]: time="2025-03-17T19:07:05.533581005Z" level=info msg="StartContainer for \"ef59427906dd3db82053222257d15920ee332ccee6a9a1d0acd7dde4f806c2e0\"" Mar 17 19:07:05.580470 systemd[1]: Started cri-containerd-ef59427906dd3db82053222257d15920ee332ccee6a9a1d0acd7dde4f806c2e0.scope. Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.601000 audit: BPF prog-id=130 op=LOAD Mar 17 19:07:05.602000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.602000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000151c48 a2=10 a3=1c items=0 ppid=2849 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:05.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353934323739303664643364623832303533323232323537643135 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001516b0 a2=3c a3=8 items=0 ppid=2849 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:05.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353934323739303664643364623832303533323232323537643135 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.603000 audit: BPF prog-id=131 op=LOAD Mar 17 19:07:05.603000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001519d8 a2=78 a3=c0001edb10 items=0 ppid=2849 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:05.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353934323739303664643364623832303533323232323537643135 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.604000 audit: BPF prog-id=132 op=LOAD Mar 17 19:07:05.604000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000151770 a2=78 a3=c0001edb58 items=0 ppid=2849 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:05.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353934323739303664643364623832303533323232323537643135 Mar 17 19:07:05.604000 audit: BPF prog-id=132 op=UNLOAD Mar 17 19:07:05.604000 audit: BPF prog-id=131 op=UNLOAD Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:05.605000 audit: BPF prog-id=133 op=LOAD Mar 17 19:07:05.605000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000151c30 a2=78 a3=c0001edf68 items=0 ppid=2849 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:05.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566353934323739303664643364623832303533323232323537643135 Mar 17 19:07:05.638292 env[1440]: time="2025-03-17T19:07:05.638229553Z" level=info msg="StartContainer for \"ef59427906dd3db82053222257d15920ee332ccee6a9a1d0acd7dde4f806c2e0\" returns successfully" Mar 17 19:07:06.293936 kubelet[2476]: E0317 19:07:06.293880 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:06.416530 kubelet[2476]: E0317 19:07:06.416490 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.416530 kubelet[2476]: W0317 19:07:06.416519 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.416851 kubelet[2476]: E0317 19:07:06.416548 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.416851 kubelet[2476]: E0317 19:07:06.416808 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.416851 kubelet[2476]: W0317 19:07:06.416824 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.416851 kubelet[2476]: E0317 19:07:06.416842 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.417068 kubelet[2476]: E0317 19:07:06.417036 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.417068 kubelet[2476]: W0317 19:07:06.417046 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.417068 kubelet[2476]: E0317 19:07:06.417059 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.417256 kubelet[2476]: E0317 19:07:06.417231 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.417256 kubelet[2476]: W0317 19:07:06.417251 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.417399 kubelet[2476]: E0317 19:07:06.417265 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.417483 kubelet[2476]: E0317 19:07:06.417465 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.417483 kubelet[2476]: W0317 19:07:06.417479 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.417603 kubelet[2476]: E0317 19:07:06.417491 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.417703 kubelet[2476]: E0317 19:07:06.417685 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.417703 kubelet[2476]: W0317 19:07:06.417699 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.417830 kubelet[2476]: E0317 19:07:06.417712 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.417908 kubelet[2476]: E0317 19:07:06.417891 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.417908 kubelet[2476]: W0317 19:07:06.417903 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.418022 kubelet[2476]: E0317 19:07:06.417915 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.418111 kubelet[2476]: E0317 19:07:06.418087 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.418111 kubelet[2476]: W0317 19:07:06.418099 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.418225 kubelet[2476]: E0317 19:07:06.418113 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.418324 kubelet[2476]: E0317 19:07:06.418310 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.418324 kubelet[2476]: W0317 19:07:06.418324 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.418457 kubelet[2476]: E0317 19:07:06.418337 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.418530 kubelet[2476]: E0317 19:07:06.418508 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.418530 kubelet[2476]: W0317 19:07:06.418521 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.418642 kubelet[2476]: E0317 19:07:06.418533 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.418734 kubelet[2476]: E0317 19:07:06.418716 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.418734 kubelet[2476]: W0317 19:07:06.418731 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.418831 kubelet[2476]: E0317 19:07:06.418745 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.418946 kubelet[2476]: E0317 19:07:06.418929 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.418946 kubelet[2476]: W0317 19:07:06.418944 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.419084 kubelet[2476]: E0317 19:07:06.418957 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.419264 kubelet[2476]: E0317 19:07:06.419138 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.419264 kubelet[2476]: W0317 19:07:06.419151 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.419264 kubelet[2476]: E0317 19:07:06.419163 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.419445 kubelet[2476]: E0317 19:07:06.419338 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.419445 kubelet[2476]: W0317 19:07:06.419347 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.419445 kubelet[2476]: E0317 19:07:06.419359 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.419597 kubelet[2476]: E0317 19:07:06.419525 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.419597 kubelet[2476]: W0317 19:07:06.419534 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.419597 kubelet[2476]: E0317 19:07:06.419545 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.420693 kubelet[2476]: E0317 19:07:06.420649 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.420693 kubelet[2476]: W0317 19:07:06.420683 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.420855 kubelet[2476]: E0317 19:07:06.420696 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.420945 kubelet[2476]: E0317 19:07:06.420927 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.420945 kubelet[2476]: W0317 19:07:06.420941 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.421088 kubelet[2476]: E0317 19:07:06.420954 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.421334 kubelet[2476]: E0317 19:07:06.421147 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.421334 kubelet[2476]: W0317 19:07:06.421159 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.421334 kubelet[2476]: E0317 19:07:06.421171 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.421599 kubelet[2476]: E0317 19:07:06.421359 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.421599 kubelet[2476]: W0317 19:07:06.421374 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.421599 kubelet[2476]: E0317 19:07:06.421394 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.421762 kubelet[2476]: E0317 19:07:06.421607 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.421762 kubelet[2476]: W0317 19:07:06.421617 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.421762 kubelet[2476]: E0317 19:07:06.421635 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.421897 kubelet[2476]: E0317 19:07:06.421848 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.421897 kubelet[2476]: W0317 19:07:06.421858 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.421897 kubelet[2476]: E0317 19:07:06.421876 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.422140 kubelet[2476]: E0317 19:07:06.422119 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.422140 kubelet[2476]: W0317 19:07:06.422133 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.422270 kubelet[2476]: E0317 19:07:06.422152 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.422866 kubelet[2476]: E0317 19:07:06.422560 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.422866 kubelet[2476]: W0317 19:07:06.422575 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.422866 kubelet[2476]: E0317 19:07:06.422592 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.422866 kubelet[2476]: E0317 19:07:06.422819 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.422866 kubelet[2476]: W0317 19:07:06.422830 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.422866 kubelet[2476]: E0317 19:07:06.422845 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.423193 kubelet[2476]: E0317 19:07:06.423018 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.423193 kubelet[2476]: W0317 19:07:06.423030 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.423193 kubelet[2476]: E0317 19:07:06.423048 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.423335 kubelet[2476]: E0317 19:07:06.423215 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.423335 kubelet[2476]: W0317 19:07:06.423225 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.423335 kubelet[2476]: E0317 19:07:06.423236 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.423471 kubelet[2476]: E0317 19:07:06.423388 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.423471 kubelet[2476]: W0317 19:07:06.423397 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.423471 kubelet[2476]: E0317 19:07:06.423408 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.423611 kubelet[2476]: E0317 19:07:06.423594 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.423611 kubelet[2476]: W0317 19:07:06.423603 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.423729 kubelet[2476]: E0317 19:07:06.423614 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.424034 kubelet[2476]: E0317 19:07:06.424014 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.424034 kubelet[2476]: W0317 19:07:06.424028 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.424183 kubelet[2476]: E0317 19:07:06.424124 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.424285 kubelet[2476]: E0317 19:07:06.424271 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.424285 kubelet[2476]: W0317 19:07:06.424283 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.424411 kubelet[2476]: E0317 19:07:06.424362 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.424513 kubelet[2476]: E0317 19:07:06.424499 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.424513 kubelet[2476]: W0317 19:07:06.424511 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.424618 kubelet[2476]: E0317 19:07:06.424524 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.424823 kubelet[2476]: E0317 19:07:06.424808 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.424823 kubelet[2476]: W0317 19:07:06.424821 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.424934 kubelet[2476]: E0317 19:07:06.424837 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:06.425217 kubelet[2476]: E0317 19:07:06.425200 2476 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 19:07:06.425217 kubelet[2476]: W0317 19:07:06.425213 2476 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 19:07:06.425312 kubelet[2476]: E0317 19:07:06.425225 2476 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 19:07:07.143701 env[1440]: time="2025-03-17T19:07:07.143626182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:07.158752 env[1440]: time="2025-03-17T19:07:07.158693927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:07.168925 env[1440]: time="2025-03-17T19:07:07.168877425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:07.175785 env[1440]: time="2025-03-17T19:07:07.175735791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:07.176224 env[1440]: time="2025-03-17T19:07:07.176189095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 19:07:07.178768 env[1440]: time="2025-03-17T19:07:07.178727619Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 19:07:07.211498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1112055336.mount: Deactivated successfully. Mar 17 19:07:07.230094 env[1440]: time="2025-03-17T19:07:07.230042413Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01\"" Mar 17 19:07:07.230881 env[1440]: time="2025-03-17T19:07:07.230847121Z" level=info msg="StartContainer for \"f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01\"" Mar 17 19:07:07.265549 systemd[1]: Started cri-containerd-f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01.scope. Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.311911 kernel: kauditd_printk_skb: 179 callbacks suppressed Mar 17 19:07:07.312039 kernel: audit: type=1400 audit(1742238427.304:976): avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3e839592b8 items=0 ppid=2922 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:07.361567 kernel: audit: type=1300 audit(1742238427.304:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3e839592b8 items=0 ppid=2922 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:07.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343538633462353833353166333831613536313730316261386434 Mar 17 19:07:07.395914 kubelet[2476]: I0317 19:07:07.385319 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 19:07:07.396203 env[1440]: time="2025-03-17T19:07:07.383733792Z" level=info msg="StartContainer for \"f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01\" returns successfully" Mar 17 19:07:07.402816 kernel: audit: type=1327 audit(1742238427.304:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343538633462353833353166333831613536313730316261386434 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.403782 systemd[1]: cri-containerd-f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01.scope: Deactivated successfully. Mar 17 19:07:07.422146 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.444339 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.444443 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.486363 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.505746 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.505866 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.485100 systemd[1]: run-containerd-runc-k8s.io-f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01-runc.lwnOs6.mount: Deactivated successfully. Mar 17 19:07:07.485201 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01-rootfs.mount: Deactivated successfully. Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.304000 audit: BPF prog-id=134 op=LOAD Mar 17 19:07:07.304000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000343c88 items=0 ppid=2922 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:07.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343538633462353833353166333831613536313730316261386434 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.538691 kernel: audit: type=1400 audit(1742238427.304:977): avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit: BPF prog-id=135 op=LOAD Mar 17 19:07:07.359000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000343cd8 items=0 ppid=2922 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:07.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343538633462353833353166333831613536313730316261386434 Mar 17 19:07:07.359000 audit: BPF prog-id=135 op=UNLOAD Mar 17 19:07:07.359000 audit: BPF prog-id=134 op=UNLOAD Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { perfmon } for pid=3054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit[3054]: AVC avc: denied { bpf } for pid=3054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:07.359000 audit: BPF prog-id=136 op=LOAD Mar 17 19:07:07.359000 audit[3054]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000343d68 items=0 ppid=2922 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:07.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639343538633462353833353166333831613536313730316261386434 Mar 17 19:07:07.423000 audit: BPF prog-id=136 op=UNLOAD Mar 17 19:07:08.293349 kubelet[2476]: E0317 19:07:08.293297 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:08.715308 kubelet[2476]: I0317 19:07:08.715236 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-fb945c6c4-992fg" podStartSLOduration=4.698882138 podStartE2EDuration="7.715212468s" podCreationTimestamp="2025-03-17 19:07:01 +0000 UTC" firstStartedPulling="2025-03-17 19:07:02.448208882 +0000 UTC m=+16.282175459" lastFinishedPulling="2025-03-17 19:07:05.464539212 +0000 UTC m=+19.298505789" observedRunningTime="2025-03-17 19:07:06.395079959 +0000 UTC m=+20.229046536" watchObservedRunningTime="2025-03-17 19:07:08.715212468 +0000 UTC m=+22.549179045" Mar 17 19:07:08.728006 env[1440]: time="2025-03-17T19:07:08.727937988Z" level=info msg="shim disconnected" id=f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01 Mar 17 19:07:08.728006 env[1440]: time="2025-03-17T19:07:08.728003188Z" level=warning msg="cleaning up after shim disconnected" id=f9458c4b58351f381a561701ba8d4f7569e3f7467fc95c4fc7f0cd1101e31c01 namespace=k8s.io Mar 17 19:07:08.728006 env[1440]: time="2025-03-17T19:07:08.728014989Z" level=info msg="cleaning up dead shim" Mar 17 19:07:08.736611 env[1440]: time="2025-03-17T19:07:08.736555269Z" level=warning msg="cleanup warnings time=\"2025-03-17T19:07:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3098 runtime=io.containerd.runc.v2\n" Mar 17 19:07:09.393161 env[1440]: time="2025-03-17T19:07:09.393094989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 19:07:10.295554 kubelet[2476]: E0317 19:07:10.295486 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:12.295053 kubelet[2476]: E0317 19:07:12.293795 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:14.295499 kubelet[2476]: E0317 19:07:14.295433 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:15.267124 env[1440]: time="2025-03-17T19:07:15.267068157Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:15.273116 env[1440]: time="2025-03-17T19:07:15.273064406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:15.277292 env[1440]: time="2025-03-17T19:07:15.277245740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:15.282318 env[1440]: time="2025-03-17T19:07:15.282277682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:15.282779 env[1440]: time="2025-03-17T19:07:15.282744286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 19:07:15.286546 env[1440]: time="2025-03-17T19:07:15.286509417Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 19:07:15.336121 env[1440]: time="2025-03-17T19:07:15.336058126Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509\"" Mar 17 19:07:15.338529 env[1440]: time="2025-03-17T19:07:15.336866032Z" level=info msg="StartContainer for \"55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509\"" Mar 17 19:07:15.368017 systemd[1]: run-containerd-runc-k8s.io-55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509-runc.QT5LUY.mount: Deactivated successfully. Mar 17 19:07:15.372325 systemd[1]: Started cri-containerd-55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509.scope. Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.396886 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 19:07:15.397014 kernel: audit: type=1400 audit(1742238435.390:983): avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fccc4119808 items=0 ppid=2922 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:15.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646139363066633262316638643239346561303634303238666639 Mar 17 19:07:15.471228 kernel: audit: type=1300 audit(1742238435.390:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fccc4119808 items=0 ppid=2922 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:15.471398 kernel: audit: type=1327 audit(1742238435.390:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646139363066633262316638643239346561303634303238666639 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.493706 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.533353 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.533515 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.536675 env[1440]: time="2025-03-17T19:07:15.536618381Z" level=info msg="StartContainer for \"55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509\" returns successfully" Mar 17 19:07:15.551291 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.571788 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.591677 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.390000 audit: BPF prog-id=137 op=LOAD Mar 17 19:07:15.390000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d2078 items=0 ppid=2922 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:15.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646139363066633262316638643239346561303634303238666639 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.611678 kernel: audit: type=1400 audit(1742238435.390:984): avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.444000 audit: BPF prog-id=138 op=LOAD Mar 17 19:07:15.444000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d20c8 items=0 ppid=2922 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:15.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646139363066633262316638643239346561303634303238666639 Mar 17 19:07:15.471000 audit: BPF prog-id=138 op=UNLOAD Mar 17 19:07:15.471000 audit: BPF prog-id=137 op=UNLOAD Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { perfmon } for pid=3120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit[3120]: AVC avc: denied { bpf } for pid=3120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:15.471000 audit: BPF prog-id=139 op=LOAD Mar 17 19:07:15.471000 audit[3120]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d2158 items=0 ppid=2922 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:15.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646139363066633262316638643239346561303634303238666639 Mar 17 19:07:16.294323 kubelet[2476]: E0317 19:07:16.294262 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:16.939130 env[1440]: time="2025-03-17T19:07:16.939058713Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 19:07:16.941298 systemd[1]: cri-containerd-55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509.scope: Deactivated successfully. Mar 17 19:07:16.943000 audit: BPF prog-id=139 op=UNLOAD Mar 17 19:07:16.968230 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509-rootfs.mount: Deactivated successfully. Mar 17 19:07:17.039021 kubelet[2476]: I0317 19:07:17.038710 2476 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Mar 17 19:07:17.513952 kubelet[2476]: I0317 19:07:17.083161 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9b3231f1-f97b-4d72-915b-fa835f8b46d0-calico-apiserver-certs\") pod \"calico-apiserver-7bbb8745b8-l7fdg\" (UID: \"9b3231f1-f97b-4d72-915b-fa835f8b46d0\") " pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" Mar 17 19:07:17.513952 kubelet[2476]: I0317 19:07:17.083202 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z42sd\" (UniqueName: \"kubernetes.io/projected/9b3231f1-f97b-4d72-915b-fa835f8b46d0-kube-api-access-z42sd\") pod \"calico-apiserver-7bbb8745b8-l7fdg\" (UID: \"9b3231f1-f97b-4d72-915b-fa835f8b46d0\") " pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" Mar 17 19:07:17.513952 kubelet[2476]: I0317 19:07:17.183548 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bdab152a-52ca-410d-bbdc-a0b9b3d6c800-config-volume\") pod \"coredns-6f6b679f8f-qb7c6\" (UID: \"bdab152a-52ca-410d-bbdc-a0b9b3d6c800\") " pod="kube-system/coredns-6f6b679f8f-qb7c6" Mar 17 19:07:17.513952 kubelet[2476]: I0317 19:07:17.183634 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/db7ba6a4-40d0-466b-baaa-53e5a7ec7d58-config-volume\") pod \"coredns-6f6b679f8f-xxwnb\" (UID: \"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58\") " pod="kube-system/coredns-6f6b679f8f-xxwnb" Mar 17 19:07:17.513952 kubelet[2476]: I0317 19:07:17.183673 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfl89\" (UniqueName: \"kubernetes.io/projected/db7ba6a4-40d0-466b-baaa-53e5a7ec7d58-kube-api-access-sfl89\") pod \"coredns-6f6b679f8f-xxwnb\" (UID: \"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58\") " pod="kube-system/coredns-6f6b679f8f-xxwnb" Mar 17 19:07:17.088547 systemd[1]: Created slice kubepods-besteffort-pod9b3231f1_f97b_4d72_915b_fa835f8b46d0.slice. Mar 17 19:07:17.519533 kubelet[2476]: I0317 19:07:17.183721 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tsrlz\" (UniqueName: \"kubernetes.io/projected/bdab152a-52ca-410d-bbdc-a0b9b3d6c800-kube-api-access-tsrlz\") pod \"coredns-6f6b679f8f-qb7c6\" (UID: \"bdab152a-52ca-410d-bbdc-a0b9b3d6c800\") " pod="kube-system/coredns-6f6b679f8f-qb7c6" Mar 17 19:07:17.519533 kubelet[2476]: I0317 19:07:17.183743 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/68d0588d-642d-4254-b2a5-0d2f1345db5c-calico-apiserver-certs\") pod \"calico-apiserver-7bbb8745b8-4qk7z\" (UID: \"68d0588d-642d-4254-b2a5-0d2f1345db5c\") " pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" Mar 17 19:07:17.519533 kubelet[2476]: I0317 19:07:17.183767 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2rjb\" (UniqueName: \"kubernetes.io/projected/68d0588d-642d-4254-b2a5-0d2f1345db5c-kube-api-access-k2rjb\") pod \"calico-apiserver-7bbb8745b8-4qk7z\" (UID: \"68d0588d-642d-4254-b2a5-0d2f1345db5c\") " pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" Mar 17 19:07:17.519533 kubelet[2476]: I0317 19:07:17.183796 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c1441905-37cb-4b72-ac35-ecbf4670d6d7-tigera-ca-bundle\") pod \"calico-kube-controllers-7b8dfbdb96-cscjj\" (UID: \"c1441905-37cb-4b72-ac35-ecbf4670d6d7\") " pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" Mar 17 19:07:17.519533 kubelet[2476]: I0317 19:07:17.183824 2476 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6mdv9\" (UniqueName: \"kubernetes.io/projected/c1441905-37cb-4b72-ac35-ecbf4670d6d7-kube-api-access-6mdv9\") pod \"calico-kube-controllers-7b8dfbdb96-cscjj\" (UID: \"c1441905-37cb-4b72-ac35-ecbf4670d6d7\") " pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" Mar 17 19:07:17.104832 systemd[1]: Created slice kubepods-burstable-poddb7ba6a4_40d0_466b_baaa_53e5a7ec7d58.slice. Mar 17 19:07:17.112574 systemd[1]: Created slice kubepods-burstable-podbdab152a_52ca_410d_bbdc_a0b9b3d6c800.slice. Mar 17 19:07:17.136554 systemd[1]: Created slice kubepods-besteffort-podc1441905_37cb_4b72_ac35_ecbf4670d6d7.slice. Mar 17 19:07:17.154970 systemd[1]: Created slice kubepods-besteffort-pod68d0588d_642d_4254_b2a5_0d2f1345db5c.slice. Mar 17 19:07:17.549713 env[1440]: time="2025-03-17T19:07:17.543297031Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qb7c6,Uid:bdab152a-52ca-410d-bbdc-a0b9b3d6c800,Namespace:kube-system,Attempt:0,}" Mar 17 19:07:17.821420 env[1440]: time="2025-03-17T19:07:17.821358745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-l7fdg,Uid:9b3231f1-f97b-4d72-915b-fa835f8b46d0,Namespace:calico-apiserver,Attempt:0,}" Mar 17 19:07:17.823025 env[1440]: time="2025-03-17T19:07:17.822990858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xxwnb,Uid:db7ba6a4-40d0-466b-baaa-53e5a7ec7d58,Namespace:kube-system,Attempt:0,}" Mar 17 19:07:17.840695 env[1440]: time="2025-03-17T19:07:17.840575698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-4qk7z,Uid:68d0588d-642d-4254-b2a5-0d2f1345db5c,Namespace:calico-apiserver,Attempt:0,}" Mar 17 19:07:17.840961 env[1440]: time="2025-03-17T19:07:17.840601698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b8dfbdb96-cscjj,Uid:c1441905-37cb-4b72-ac35-ecbf4670d6d7,Namespace:calico-system,Attempt:0,}" Mar 17 19:07:18.299228 systemd[1]: Created slice kubepods-besteffort-pod305fb96c_f6b0_4e24_9c8d_d76d5088c95d.slice. Mar 17 19:07:18.302071 env[1440]: time="2025-03-17T19:07:18.302018329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r26l7,Uid:305fb96c-f6b0-4e24-9c8d-d76d5088c95d,Namespace:calico-system,Attempt:0,}" Mar 17 19:07:18.617674 env[1440]: time="2025-03-17T19:07:18.617528796Z" level=info msg="shim disconnected" id=55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509 Mar 17 19:07:18.617674 env[1440]: time="2025-03-17T19:07:18.617575696Z" level=warning msg="cleaning up after shim disconnected" id=55da960fc2b1f8d294ea064028ff964041f2b3b5ffbefc0385c253525a328509 namespace=k8s.io Mar 17 19:07:18.617674 env[1440]: time="2025-03-17T19:07:18.617587096Z" level=info msg="cleaning up dead shim" Mar 17 19:07:18.627400 env[1440]: time="2025-03-17T19:07:18.627350673Z" level=warning msg="cleanup warnings time=\"2025-03-17T19:07:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3182 runtime=io.containerd.runc.v2\n" Mar 17 19:07:18.840937 env[1440]: time="2025-03-17T19:07:18.840846342Z" level=error msg="Failed to destroy network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.841364 env[1440]: time="2025-03-17T19:07:18.841310746Z" level=error msg="encountered an error cleaning up failed sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.841497 env[1440]: time="2025-03-17T19:07:18.841393847Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-4qk7z,Uid:68d0588d-642d-4254-b2a5-0d2f1345db5c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.841824 kubelet[2476]: E0317 19:07:18.841759 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.842267 kubelet[2476]: E0317 19:07:18.841890 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" Mar 17 19:07:18.842267 kubelet[2476]: E0317 19:07:18.841921 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" Mar 17 19:07:18.842267 kubelet[2476]: E0317 19:07:18.841999 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bbb8745b8-4qk7z_calico-apiserver(68d0588d-642d-4254-b2a5-0d2f1345db5c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bbb8745b8-4qk7z_calico-apiserver(68d0588d-642d-4254-b2a5-0d2f1345db5c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" podUID="68d0588d-642d-4254-b2a5-0d2f1345db5c" Mar 17 19:07:18.986226 env[1440]: time="2025-03-17T19:07:18.986069178Z" level=error msg="Failed to destroy network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.987352 env[1440]: time="2025-03-17T19:07:18.987299388Z" level=error msg="encountered an error cleaning up failed sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.987699 env[1440]: time="2025-03-17T19:07:18.987633490Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xxwnb,Uid:db7ba6a4-40d0-466b-baaa-53e5a7ec7d58,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.988750 kubelet[2476]: E0317 19:07:18.988074 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:18.988750 kubelet[2476]: E0317 19:07:18.988159 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xxwnb" Mar 17 19:07:18.988750 kubelet[2476]: E0317 19:07:18.988186 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xxwnb" Mar 17 19:07:18.988962 kubelet[2476]: E0317 19:07:18.988247 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-xxwnb_kube-system(db7ba6a4-40d0-466b-baaa-53e5a7ec7d58)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-xxwnb_kube-system(db7ba6a4-40d0-466b-baaa-53e5a7ec7d58)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xxwnb" podUID="db7ba6a4-40d0-466b-baaa-53e5a7ec7d58" Mar 17 19:07:19.020774 env[1440]: time="2025-03-17T19:07:19.020696646Z" level=error msg="Failed to destroy network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.021215 env[1440]: time="2025-03-17T19:07:19.021156050Z" level=error msg="encountered an error cleaning up failed sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.021327 env[1440]: time="2025-03-17T19:07:19.021248050Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qb7c6,Uid:bdab152a-52ca-410d-bbdc-a0b9b3d6c800,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.021649 kubelet[2476]: E0317 19:07:19.021599 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.021788 kubelet[2476]: E0317 19:07:19.021714 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qb7c6" Mar 17 19:07:19.021788 kubelet[2476]: E0317 19:07:19.021757 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-qb7c6" Mar 17 19:07:19.021892 kubelet[2476]: E0317 19:07:19.021833 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-qb7c6_kube-system(bdab152a-52ca-410d-bbdc-a0b9b3d6c800)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-qb7c6_kube-system(bdab152a-52ca-410d-bbdc-a0b9b3d6c800)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qb7c6" podUID="bdab152a-52ca-410d-bbdc-a0b9b3d6c800" Mar 17 19:07:19.032412 env[1440]: time="2025-03-17T19:07:19.032358036Z" level=error msg="Failed to destroy network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.033070 env[1440]: time="2025-03-17T19:07:19.032932240Z" level=error msg="encountered an error cleaning up failed sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.036854 env[1440]: time="2025-03-17T19:07:19.036799070Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b8dfbdb96-cscjj,Uid:c1441905-37cb-4b72-ac35-ecbf4670d6d7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.039156 kubelet[2476]: E0317 19:07:19.039098 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.039392 kubelet[2476]: E0317 19:07:19.039342 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" Mar 17 19:07:19.039554 kubelet[2476]: E0317 19:07:19.039517 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" Mar 17 19:07:19.040841 kubelet[2476]: E0317 19:07:19.039690 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7b8dfbdb96-cscjj_calico-system(c1441905-37cb-4b72-ac35-ecbf4670d6d7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7b8dfbdb96-cscjj_calico-system(c1441905-37cb-4b72-ac35-ecbf4670d6d7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" podUID="c1441905-37cb-4b72-ac35-ecbf4670d6d7" Mar 17 19:07:19.059796 env[1440]: time="2025-03-17T19:07:19.059689546Z" level=error msg="Failed to destroy network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.060352 env[1440]: time="2025-03-17T19:07:19.060278150Z" level=error msg="encountered an error cleaning up failed sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.060444 env[1440]: time="2025-03-17T19:07:19.060382851Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-l7fdg,Uid:9b3231f1-f97b-4d72-915b-fa835f8b46d0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.060721 kubelet[2476]: E0317 19:07:19.060669 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.060846 kubelet[2476]: E0317 19:07:19.060747 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" Mar 17 19:07:19.060846 kubelet[2476]: E0317 19:07:19.060773 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" Mar 17 19:07:19.060947 kubelet[2476]: E0317 19:07:19.060836 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bbb8745b8-l7fdg_calico-apiserver(9b3231f1-f97b-4d72-915b-fa835f8b46d0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bbb8745b8-l7fdg_calico-apiserver(9b3231f1-f97b-4d72-915b-fa835f8b46d0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" podUID="9b3231f1-f97b-4d72-915b-fa835f8b46d0" Mar 17 19:07:19.072617 env[1440]: time="2025-03-17T19:07:19.072554845Z" level=error msg="Failed to destroy network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.073105 env[1440]: time="2025-03-17T19:07:19.073058849Z" level=error msg="encountered an error cleaning up failed sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.073221 env[1440]: time="2025-03-17T19:07:19.073132649Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r26l7,Uid:305fb96c-f6b0-4e24-9c8d-d76d5088c95d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.073443 kubelet[2476]: E0317 19:07:19.073403 2476 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.073541 kubelet[2476]: E0317 19:07:19.073469 2476 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:19.073541 kubelet[2476]: E0317 19:07:19.073495 2476 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r26l7" Mar 17 19:07:19.073628 kubelet[2476]: E0317 19:07:19.073565 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r26l7_calico-system(305fb96c-f6b0-4e24-9c8d-d76d5088c95d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r26l7_calico-system(305fb96c-f6b0-4e24-9c8d-d76d5088c95d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:19.430326 kubelet[2476]: I0317 19:07:19.430278 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:19.431329 env[1440]: time="2025-03-17T19:07:19.431282902Z" level=info msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" Mar 17 19:07:19.431924 kubelet[2476]: I0317 19:07:19.431901 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:19.432500 env[1440]: time="2025-03-17T19:07:19.432453411Z" level=info msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" Mar 17 19:07:19.434208 kubelet[2476]: I0317 19:07:19.434176 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:19.436461 kubelet[2476]: I0317 19:07:19.435405 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:19.436570 env[1440]: time="2025-03-17T19:07:19.435873837Z" level=info msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" Mar 17 19:07:19.436772 env[1440]: time="2025-03-17T19:07:19.436737544Z" level=info msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" Mar 17 19:07:19.438905 kubelet[2476]: I0317 19:07:19.438521 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:19.440492 env[1440]: time="2025-03-17T19:07:19.440460272Z" level=info msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" Mar 17 19:07:19.454052 env[1440]: time="2025-03-17T19:07:19.454019677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 19:07:19.458866 kubelet[2476]: I0317 19:07:19.458837 2476 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:19.460253 env[1440]: time="2025-03-17T19:07:19.459476018Z" level=info msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" Mar 17 19:07:19.650883 env[1440]: time="2025-03-17T19:07:19.650807389Z" level=error msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" failed" error="failed to destroy network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.654275 kubelet[2476]: E0317 19:07:19.654210 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:19.654437 kubelet[2476]: E0317 19:07:19.654300 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744"} Mar 17 19:07:19.654437 kubelet[2476]: E0317 19:07:19.654405 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1441905-37cb-4b72-ac35-ecbf4670d6d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.654592 kubelet[2476]: E0317 19:07:19.654435 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1441905-37cb-4b72-ac35-ecbf4670d6d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" podUID="c1441905-37cb-4b72-ac35-ecbf4670d6d7" Mar 17 19:07:19.675762 env[1440]: time="2025-03-17T19:07:19.675680380Z" level=error msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" failed" error="failed to destroy network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.676337 kubelet[2476]: E0317 19:07:19.676264 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:19.676465 kubelet[2476]: E0317 19:07:19.676349 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08"} Mar 17 19:07:19.676465 kubelet[2476]: E0317 19:07:19.676403 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bdab152a-52ca-410d-bbdc-a0b9b3d6c800\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.676465 kubelet[2476]: E0317 19:07:19.676435 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bdab152a-52ca-410d-bbdc-a0b9b3d6c800\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-qb7c6" podUID="bdab152a-52ca-410d-bbdc-a0b9b3d6c800" Mar 17 19:07:19.704099 env[1440]: time="2025-03-17T19:07:19.702409986Z" level=error msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" failed" error="failed to destroy network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.704291 kubelet[2476]: E0317 19:07:19.703836 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:19.704291 kubelet[2476]: E0317 19:07:19.703925 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d"} Mar 17 19:07:19.704291 kubelet[2476]: E0317 19:07:19.703985 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.704291 kubelet[2476]: E0317 19:07:19.704020 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"305fb96c-f6b0-4e24-9c8d-d76d5088c95d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r26l7" podUID="305fb96c-f6b0-4e24-9c8d-d76d5088c95d" Mar 17 19:07:19.714291 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6-shm.mount: Deactivated successfully. Mar 17 19:07:19.714413 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08-shm.mount: Deactivated successfully. Mar 17 19:07:19.714496 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1-shm.mount: Deactivated successfully. Mar 17 19:07:19.722069 env[1440]: time="2025-03-17T19:07:19.721996436Z" level=error msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" failed" error="failed to destroy network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.722673 kubelet[2476]: E0317 19:07:19.722465 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:19.722673 kubelet[2476]: E0317 19:07:19.722539 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1"} Mar 17 19:07:19.722673 kubelet[2476]: E0317 19:07:19.722588 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68d0588d-642d-4254-b2a5-0d2f1345db5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.722673 kubelet[2476]: E0317 19:07:19.722618 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68d0588d-642d-4254-b2a5-0d2f1345db5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" podUID="68d0588d-642d-4254-b2a5-0d2f1345db5c" Mar 17 19:07:19.724910 env[1440]: time="2025-03-17T19:07:19.724851858Z" level=error msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" failed" error="failed to destroy network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.725263 kubelet[2476]: E0317 19:07:19.725223 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:19.725383 kubelet[2476]: E0317 19:07:19.725272 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06"} Mar 17 19:07:19.725383 kubelet[2476]: E0317 19:07:19.725311 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.725383 kubelet[2476]: E0317 19:07:19.725346 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xxwnb" podUID="db7ba6a4-40d0-466b-baaa-53e5a7ec7d58" Mar 17 19:07:19.731543 env[1440]: time="2025-03-17T19:07:19.731489209Z" level=error msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" failed" error="failed to destroy network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 19:07:19.731827 kubelet[2476]: E0317 19:07:19.731795 2476 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:19.731935 kubelet[2476]: E0317 19:07:19.731841 2476 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6"} Mar 17 19:07:19.731935 kubelet[2476]: E0317 19:07:19.731882 2476 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9b3231f1-f97b-4d72-915b-fa835f8b46d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 19:07:19.731935 kubelet[2476]: E0317 19:07:19.731915 2476 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9b3231f1-f97b-4d72-915b-fa835f8b46d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" podUID="9b3231f1-f97b-4d72-915b-fa835f8b46d0" Mar 17 19:07:20.458345 kubelet[2476]: I0317 19:07:20.457824 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 19:07:20.496000 audit[3495]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:20.519732 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 19:07:20.519932 kernel: audit: type=1325 audit(1742238440.496:990): table=filter:98 family=2 entries=17 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:20.519967 kernel: audit: type=1300 audit(1742238440.496:990): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8655a5e0 a2=0 a3=7ffe8655a5cc items=0 ppid=2581 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:20.496000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe8655a5e0 a2=0 a3=7ffe8655a5cc items=0 ppid=2581 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:20.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:20.561695 kernel: audit: type=1327 audit(1742238440.496:990): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:20.561000 audit[3495]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:20.577674 kernel: audit: type=1325 audit(1742238440.561:991): table=nat:99 family=2 entries=19 op=nft_register_chain pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:20.577811 kernel: audit: type=1300 audit(1742238440.561:991): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe8655a5e0 a2=0 a3=7ffe8655a5cc items=0 ppid=2581 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:20.561000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe8655a5e0 a2=0 a3=7ffe8655a5cc items=0 ppid=2581 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:20.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:20.619277 kernel: audit: type=1327 audit(1742238440.561:991): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:22.714222 waagent[1626]: 2025-03-17T19:07:22.714108Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 2] Mar 17 19:07:22.727096 waagent[1626]: 2025-03-17T19:07:22.727004Z INFO ExtHandler Mar 17 19:07:22.727319 waagent[1626]: 2025-03-17T19:07:22.727258Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: ef0fc574-794d-4edf-b529-e74aaca576a2 eTag: 18318647298004097053 source: Fabric] Mar 17 19:07:22.728156 waagent[1626]: 2025-03-17T19:07:22.728085Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 19:07:22.729370 waagent[1626]: 2025-03-17T19:07:22.729305Z INFO ExtHandler Mar 17 19:07:22.729512 waagent[1626]: 2025-03-17T19:07:22.729455Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 2] Mar 17 19:07:22.810862 waagent[1626]: 2025-03-17T19:07:22.810773Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 19:07:22.909477 waagent[1626]: 2025-03-17T19:07:22.909317Z INFO ExtHandler Downloaded certificate {'thumbprint': '2EB5EF1CC78E0781F633DD5620C4989DB01432E8', 'hasPrivateKey': True} Mar 17 19:07:22.911052 waagent[1626]: 2025-03-17T19:07:22.910971Z INFO ExtHandler Downloaded certificate {'thumbprint': '18C6D82936228DD97712C3686D1AD1B980E9A747', 'hasPrivateKey': False} Mar 17 19:07:22.912457 waagent[1626]: 2025-03-17T19:07:22.912387Z INFO ExtHandler Fetch goal state completed Mar 17 19:07:22.913778 waagent[1626]: 2025-03-17T19:07:22.913711Z INFO ExtHandler ExtHandler VM enabled for RSM updates, switching to RSM update mode Mar 17 19:07:22.915939 waagent[1626]: 2025-03-17T19:07:22.915844Z INFO ExtHandler ExtHandler Mar 17 19:07:22.916231 waagent[1626]: 2025-03-17T19:07:22.916165Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_2 channel: WireServer source: Fabric activity: 74b7dd63-a5ff-47fe-b5f1-2f07b7ff330b correlation 5ff9fcc1-4fd9-47a6-bdf3-2a77ef3c7c7b created: 2025-03-17T19:07:14.942429Z] Mar 17 19:07:22.917238 waagent[1626]: 2025-03-17T19:07:22.917177Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 19:07:22.919663 waagent[1626]: 2025-03-17T19:07:22.919592Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_2 3 ms] Mar 17 19:07:28.175294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1750930838.mount: Deactivated successfully. Mar 17 19:07:28.226603 env[1440]: time="2025-03-17T19:07:28.226534692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:28.234642 env[1440]: time="2025-03-17T19:07:28.234586246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:28.239433 env[1440]: time="2025-03-17T19:07:28.239389378Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:28.243381 env[1440]: time="2025-03-17T19:07:28.243335504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:28.243769 env[1440]: time="2025-03-17T19:07:28.243734907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 19:07:28.264843 env[1440]: time="2025-03-17T19:07:28.264797647Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 19:07:28.298755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3475695422.mount: Deactivated successfully. Mar 17 19:07:28.322091 env[1440]: time="2025-03-17T19:07:28.322030527Z" level=info msg="CreateContainer within sandbox \"ed9d5219b765394ae093206550c783071475e2300e4fa3f275c99915e403efb2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398\"" Mar 17 19:07:28.322995 env[1440]: time="2025-03-17T19:07:28.322826432Z" level=info msg="StartContainer for \"8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398\"" Mar 17 19:07:28.341501 systemd[1]: Started cri-containerd-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398.scope. Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f1ab2f50c28 items=0 ppid=2922 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:28.409393 kernel: audit: type=1400 audit(1742238448.359:992): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.409450 kernel: audit: type=1300 audit(1742238448.359:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f1ab2f50c28 items=0 ppid=2922 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:28.409482 kernel: audit: type=1327 audit(1742238448.359:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646538346261613366333936363365663763356261626531343932 Mar 17 19:07:28.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646538346261613366333936363365663763356261626531343932 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.461736 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.494869 env[1440]: time="2025-03-17T19:07:28.494820176Z" level=info msg="StartContainer for \"8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398\" returns successfully" Mar 17 19:07:28.500268 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.500413 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.523683 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.523865 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.561074 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.561251 kernel: audit: type=1400 audit(1742238448.359:993): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.359000 audit: BPF prog-id=140 op=LOAD Mar 17 19:07:28.359000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bedd8 items=0 ppid=2922 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:28.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646538346261613366333936363365663763356261626531343932 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.379000 audit: BPF prog-id=141 op=LOAD Mar 17 19:07:28.379000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bee28 items=0 ppid=2922 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:28.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646538346261613366333936363365663763356261626531343932 Mar 17 19:07:28.432000 audit: BPF prog-id=141 op=UNLOAD Mar 17 19:07:28.432000 audit: BPF prog-id=140 op=UNLOAD Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:28.432000 audit: BPF prog-id=142 op=LOAD Mar 17 19:07:28.432000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001beeb8 items=0 ppid=2922 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:28.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865646538346261613366333936363365663763356261626531343932 Mar 17 19:07:28.838714 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 19:07:28.838935 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 19:07:29.530576 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.19jUOA.mount: Deactivated successfully. Mar 17 19:07:30.141000 audit[3637]: AVC avc: denied { write } for pid=3637 comm="tee" name="fd" dev="proc" ino=30766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.141000 audit[3637]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3e72c9f9 a2=241 a3=1b6 items=1 ppid=3608 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.141000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 19:07:30.141000 audit: PATH item=0 name="/dev/fd/63" inode=30763 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.141000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.149000 audit[3633]: AVC avc: denied { write } for pid=3633 comm="tee" name="fd" dev="proc" ino=29912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.149000 audit[3633]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc02e94a08 a2=241 a3=1b6 items=1 ppid=3602 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.149000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 19:07:30.149000 audit: PATH item=0 name="/dev/fd/63" inode=29901 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.167000 audit[3657]: AVC avc: denied { write } for pid=3657 comm="tee" name="fd" dev="proc" ino=29931 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.167000 audit[3657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd942259f8 a2=241 a3=1b6 items=1 ppid=3611 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.167000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 19:07:30.167000 audit: PATH item=0 name="/dev/fd/63" inode=29921 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.177000 audit[3662]: AVC avc: denied { write } for pid=3662 comm="tee" name="fd" dev="proc" ino=29937 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.179000 audit[3659]: AVC avc: denied { write } for pid=3659 comm="tee" name="fd" dev="proc" ino=29940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.183000 audit[3667]: AVC avc: denied { write } for pid=3667 comm="tee" name="fd" dev="proc" ino=29943 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.184000 audit[3643]: AVC avc: denied { write } for pid=3643 comm="tee" name="fd" dev="proc" ino=29946 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 19:07:30.179000 audit[3659]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe83303a08 a2=241 a3=1b6 items=1 ppid=3603 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.179000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 19:07:30.183000 audit[3667]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc2e8ea08 a2=241 a3=1b6 items=1 ppid=3606 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.179000 audit: PATH item=0 name="/dev/fd/63" inode=29924 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.179000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.183000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 19:07:30.183000 audit: PATH item=0 name="/dev/fd/63" inode=30783 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.183000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.177000 audit[3662]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0f927a0a a2=241 a3=1b6 items=1 ppid=3614 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.184000 audit[3643]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcdccba09 a2=241 a3=1b6 items=1 ppid=3617 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.177000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 19:07:30.177000 audit: PATH item=0 name="/dev/fd/63" inode=29925 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.177000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.184000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 19:07:30.184000 audit: PATH item=0 name="/dev/fd/63" inode=29915 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 19:07:30.184000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 19:07:30.296365 env[1440]: time="2025-03-17T19:07:30.296311796Z" level=info msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" Mar 17 19:07:30.392725 kubelet[2476]: I0317 19:07:30.392029 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-m8pln" podStartSLOduration=2.7335834549999998 podStartE2EDuration="28.391991013s" podCreationTimestamp="2025-03-17 19:07:02 +0000 UTC" firstStartedPulling="2025-03-17 19:07:02.586232355 +0000 UTC m=+16.420198932" lastFinishedPulling="2025-03-17 19:07:28.244639913 +0000 UTC m=+42.078606490" observedRunningTime="2025-03-17 19:07:29.539446567 +0000 UTC m=+43.373413244" watchObservedRunningTime="2025-03-17 19:07:30.391991013 +0000 UTC m=+44.225957590" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.383 [INFO][3695] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.383 [INFO][3695] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" iface="eth0" netns="/var/run/netns/cni-f1dbbf2c-226a-b34a-3986-164a651d3a13" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.383 [INFO][3695] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" iface="eth0" netns="/var/run/netns/cni-f1dbbf2c-226a-b34a-3986-164a651d3a13" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.384 [INFO][3695] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" iface="eth0" netns="/var/run/netns/cni-f1dbbf2c-226a-b34a-3986-164a651d3a13" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.384 [INFO][3695] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.384 [INFO][3695] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.434 [INFO][3701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.434 [INFO][3701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.434 [INFO][3701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.441 [WARNING][3701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.441 [INFO][3701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.443 [INFO][3701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:30.448078 env[1440]: 2025-03-17 19:07:30.446 [INFO][3695] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:30.452669 systemd[1]: run-netns-cni\x2df1dbbf2c\x2d226a\x2db34a\x2d3986\x2d164a651d3a13.mount: Deactivated successfully. Mar 17 19:07:30.456443 env[1440]: time="2025-03-17T19:07:30.456390329Z" level=info msg="TearDown network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" successfully" Mar 17 19:07:30.456734 env[1440]: time="2025-03-17T19:07:30.456703631Z" level=info msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" returns successfully" Mar 17 19:07:30.457940 env[1440]: time="2025-03-17T19:07:30.457911639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-l7fdg,Uid:9b3231f1-f97b-4d72-915b-fa835f8b46d0,Namespace:calico-apiserver,Attempt:1,}" Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.591000 audit: BPF prog-id=143 op=LOAD Mar 17 19:07:30.591000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc11e79a50 a2=98 a3=3 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.591000 audit: BPF prog-id=143 op=UNLOAD Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit: BPF prog-id=144 op=LOAD Mar 17 19:07:30.592000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc11e79830 a2=74 a3=540051 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.592000 audit: BPF prog-id=144 op=UNLOAD Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.592000 audit: BPF prog-id=145 op=LOAD Mar 17 19:07:30.592000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc11e79860 a2=94 a3=2 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.592000 audit: BPF prog-id=145 op=UNLOAD Mar 17 19:07:30.751907 systemd-networkd[1590]: cali350a685ed58: Link UP Mar 17 19:07:30.771170 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:07:30.771350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali350a685ed58: link becomes ready Mar 17 19:07:30.774072 systemd-networkd[1590]: cali350a685ed58: Gained carrier Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.597 [INFO][3729] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0 calico-apiserver-7bbb8745b8- calico-apiserver 9b3231f1-f97b-4d72-915b-fa835f8b46d0 747 0 2025-03-17 19:07:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bbb8745b8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd calico-apiserver-7bbb8745b8-l7fdg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali350a685ed58 [] []}} ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.598 [INFO][3729] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.651 [INFO][3770] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" HandleID="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.668 [INFO][3770] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" HandleID="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b4e50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"calico-apiserver-7bbb8745b8-l7fdg", "timestamp":"2025-03-17 19:07:30.651936591 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.668 [INFO][3770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.668 [INFO][3770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.668 [INFO][3770] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.672 [INFO][3770] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.679 [INFO][3770] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.685 [INFO][3770] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.687 [INFO][3770] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.689 [INFO][3770] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.689 [INFO][3770] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.691 [INFO][3770] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.697 [INFO][3770] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.712 [INFO][3770] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.1/26] block=192.168.32.0/26 handle="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.712 [INFO][3770] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.1/26] handle="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.712 [INFO][3770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:30.792443 env[1440]: 2025-03-17 19:07:30.712 [INFO][3770] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.1/26] IPv6=[] ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" HandleID="k8s-pod-network.130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.714 [INFO][3729] cni-plugin/k8s.go 386: Populated endpoint ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b3231f1-f97b-4d72-915b-fa835f8b46d0", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"calico-apiserver-7bbb8745b8-l7fdg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali350a685ed58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.714 [INFO][3729] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.1/32] ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.714 [INFO][3729] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali350a685ed58 ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.774 [INFO][3729] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.775 [INFO][3729] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b3231f1-f97b-4d72-915b-fa835f8b46d0", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee", Pod:"calico-apiserver-7bbb8745b8-l7fdg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali350a685ed58", MAC:"fa:45:19:14:fc:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:30.793520 env[1440]: 2025-03-17 19:07:30.790 [INFO][3729] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-l7fdg" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:30.811887 env[1440]: time="2025-03-17T19:07:30.811785423Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:30.812248 env[1440]: time="2025-03-17T19:07:30.812196325Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:30.812444 env[1440]: time="2025-03-17T19:07:30.812407627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:30.812777 env[1440]: time="2025-03-17T19:07:30.812725529Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee pid=3800 runtime=io.containerd.runc.v2 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.815000 audit: BPF prog-id=146 op=LOAD Mar 17 19:07:30.815000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc11e79720 a2=40 a3=1 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.815000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.816000 audit: BPF prog-id=146 op=UNLOAD Mar 17 19:07:30.816000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.816000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc11e797f0 a2=50 a3=7ffc11e798d0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.816000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.828614 systemd[1]: Started cri-containerd-130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee.scope. Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e79730 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11e79760 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11e79670 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e79780 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e79760 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e79750 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e79780 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11e79760 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11e79780 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc11e79750 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc11e797c0 a2=28 a3=0 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc11e79570 a2=50 a3=1 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit: BPF prog-id=147 op=LOAD Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc11e79570 a2=94 a3=5 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit: BPF prog-id=147 op=UNLOAD Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc11e79620 a2=50 a3=1 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc11e79740 a2=4 a3=38 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.833000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:07:30.833000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc11e79790 a2=94 a3=6 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.833000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:07:30.834000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc11e78f40 a2=94 a3=83 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.834000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.834000 audit[3768]: AVC avc: denied { confidentiality } for pid=3768 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:07:30.834000 audit[3768]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc11e78f40 a2=94 a3=83 items=0 ppid=3605 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.834000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit: BPF prog-id=148 op=LOAD Mar 17 19:07:30.853000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeda342fd0 a2=98 a3=1999999999999999 items=0 ppid=3605 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:07:30.853000 audit: BPF prog-id=148 op=UNLOAD Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit: BPF prog-id=149 op=LOAD Mar 17 19:07:30.853000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeda342eb0 a2=74 a3=ffff items=0 ppid=3605 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:07:30.853000 audit: BPF prog-id=149 op=UNLOAD Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { perfmon } for pid=3829 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit[3829]: AVC avc: denied { bpf } for pid=3829 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.853000 audit: BPF prog-id=150 op=LOAD Mar 17 19:07:30.853000 audit[3829]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeda342ef0 a2=40 a3=7ffeda3430d0 items=0 ppid=3605 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.853000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 19:07:30.853000 audit: BPF prog-id=150 op=UNLOAD Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.863000 audit: BPF prog-id=151 op=LOAD Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3800 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306530643532663634356136643733633034306362323436636436 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3800 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306530643532663634356136643733633034306362323436636436 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit: BPF prog-id=152 op=LOAD Mar 17 19:07:30.865000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002380b0 items=0 ppid=3800 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306530643532663634356136643733633034306362323436636436 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit: BPF prog-id=153 op=LOAD Mar 17 19:07:30.865000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002380f8 items=0 ppid=3800 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306530643532663634356136643733633034306362323436636436 Mar 17 19:07:30.865000 audit: BPF prog-id=153 op=UNLOAD Mar 17 19:07:30.865000 audit: BPF prog-id=152 op=UNLOAD Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { perfmon } for pid=3810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit[3810]: AVC avc: denied { bpf } for pid=3810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:30.865000 audit: BPF prog-id=154 op=LOAD Mar 17 19:07:30.865000 audit[3810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000238508 items=0 ppid=3800 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:30.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133306530643532663634356136643733633034306362323436636436 Mar 17 19:07:30.926312 env[1440]: time="2025-03-17T19:07:30.926257261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-l7fdg,Uid:9b3231f1-f97b-4d72-915b-fa835f8b46d0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee\"" Mar 17 19:07:30.928597 env[1440]: time="2025-03-17T19:07:30.928561176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 19:07:31.006504 systemd-networkd[1590]: vxlan.calico: Link UP Mar 17 19:07:31.006518 systemd-networkd[1590]: vxlan.calico: Gained carrier Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.032000 audit: BPF prog-id=155 op=LOAD Mar 17 19:07:31.032000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff56929730 a2=98 a3=ffffffff items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.032000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.032000 audit: BPF prog-id=155 op=UNLOAD Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit: BPF prog-id=156 op=LOAD Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff56929540 a2=74 a3=540051 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit: BPF prog-id=156 op=UNLOAD Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit: BPF prog-id=157 op=LOAD Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff56929570 a2=94 a3=2 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit: BPF prog-id=157 op=UNLOAD Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff56929440 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56929470 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56929380 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff56929490 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff56929470 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff56929460 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff56929490 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56929470 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56929490 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff56929460 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff569294d0 a2=28 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.033000 audit: BPF prog-id=158 op=LOAD Mar 17 19:07:31.033000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff56929340 a2=40 a3=0 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.033000 audit: BPF prog-id=158 op=UNLOAD Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff56929330 a2=50 a3=2800 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff56929330 a2=50 a3=2800 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit: BPF prog-id=159 op=LOAD Mar 17 19:07:31.034000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff56928b50 a2=94 a3=2 items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.034000 audit: BPF prog-id=159 op=UNLOAD Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.034000 audit: BPF prog-id=160 op=LOAD Mar 17 19:07:31.034000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff56928c50 a2=94 a3=2d items=0 ppid=3605 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit: BPF prog-id=161 op=LOAD Mar 17 19:07:31.042000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe419562f0 a2=98 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.042000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.042000 audit: BPF prog-id=161 op=UNLOAD Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit: BPF prog-id=162 op=LOAD Mar 17 19:07:31.042000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe419560d0 a2=74 a3=540051 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.042000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.042000 audit: BPF prog-id=162 op=UNLOAD Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.042000 audit: BPF prog-id=163 op=LOAD Mar 17 19:07:31.042000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe41956100 a2=94 a3=2 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.042000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.042000 audit: BPF prog-id=163 op=UNLOAD Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit: BPF prog-id=164 op=LOAD Mar 17 19:07:31.176000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe41955fc0 a2=40 a3=1 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.176000 audit: BPF prog-id=164 op=UNLOAD Mar 17 19:07:31.176000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.176000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe41956090 a2=50 a3=7ffe41956170 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41955fd0 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe41956000 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe41955f10 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41956020 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41956000 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41955ff0 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41956020 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe41956000 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe41956020 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe41955ff0 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.185000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.185000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe41956060 a2=28 a3=0 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.185000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe41955e10 a2=50 a3=1 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit: BPF prog-id=165 op=LOAD Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe41955e10 a2=94 a3=5 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit: BPF prog-id=165 op=UNLOAD Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe41955ec0 a2=50 a3=1 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe41955fe0 a2=4 a3=38 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { confidentiality } for pid=3865 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe41956030 a2=94 a3=6 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { confidentiality } for pid=3865 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe419557e0 a2=94 a3=83 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.186000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe419557e0 a2=94 a3=83 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.187000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.187000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe41957220 a2=10 a3=f1f00800 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.187000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.187000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe419570c0 a2=10 a3=3 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.188000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.188000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe41957060 a2=10 a3=3 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.188000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.188000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe41957060 a2=10 a3=7 items=0 ppid=3605 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 19:07:31.195000 audit: BPF prog-id=160 op=UNLOAD Mar 17 19:07:31.294800 env[1440]: time="2025-03-17T19:07:31.294672312Z" level=info msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" Mar 17 19:07:31.375000 audit[3914]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3914 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:31.375000 audit[3914]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc5d8a4c60 a2=0 a3=7ffc5d8a4c4c items=0 ppid=3605 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.375000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:31.412000 audit[3913]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:31.412000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc79390850 a2=0 a3=7ffc7939083c items=0 ppid=3605 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:31.425000 audit[3917]: NETFILTER_CFG table=filter:102 family=2 entries=75 op=nft_register_chain pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:31.425000 audit[3917]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7fff61d46e10 a2=0 a3=7fff61d46dfc items=0 ppid=3605 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.382 [INFO][3900] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.382 [INFO][3900] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" iface="eth0" netns="/var/run/netns/cni-b3683926-21b2-14ad-29e2-a38d063e1f06" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.383 [INFO][3900] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" iface="eth0" netns="/var/run/netns/cni-b3683926-21b2-14ad-29e2-a38d063e1f06" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.383 [INFO][3900] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" iface="eth0" netns="/var/run/netns/cni-b3683926-21b2-14ad-29e2-a38d063e1f06" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.383 [INFO][3900] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.383 [INFO][3900] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.410 [INFO][3923] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.411 [INFO][3923] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.411 [INFO][3923] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.423 [WARNING][3923] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.423 [INFO][3923] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.428 [INFO][3923] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:31.431417 env[1440]: 2025-03-17 19:07:31.429 [INFO][3900] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:31.432217 env[1440]: time="2025-03-17T19:07:31.431579083Z" level=info msg="TearDown network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" successfully" Mar 17 19:07:31.432217 env[1440]: time="2025-03-17T19:07:31.431631784Z" level=info msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" returns successfully" Mar 17 19:07:31.432647 env[1440]: time="2025-03-17T19:07:31.432481089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-4qk7z,Uid:68d0588d-642d-4254-b2a5-0d2f1345db5c,Namespace:calico-apiserver,Attempt:1,}" Mar 17 19:07:31.432000 audit[3916]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:31.432000 audit[3916]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc3f814050 a2=0 a3=7ffc3f81403c items=0 ppid=3605 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:31.454006 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.ddMyyu.mount: Deactivated successfully. Mar 17 19:07:31.454126 systemd[1]: run-netns-cni\x2db3683926\x2d21b2\x2d14ad\x2d29e2\x2da38d063e1f06.mount: Deactivated successfully. Mar 17 19:07:31.599316 systemd-networkd[1590]: calibf6a68a922f: Link UP Mar 17 19:07:31.607731 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibf6a68a922f: link becomes ready Mar 17 19:07:31.607999 systemd-networkd[1590]: calibf6a68a922f: Gained carrier Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.525 [INFO][3931] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0 calico-apiserver-7bbb8745b8- calico-apiserver 68d0588d-642d-4254-b2a5-0d2f1345db5c 755 0 2025-03-17 19:07:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bbb8745b8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd calico-apiserver-7bbb8745b8-4qk7z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibf6a68a922f [] []}} ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.525 [INFO][3931] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.552 [INFO][3943] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" HandleID="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.564 [INFO][3943] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" HandleID="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003baca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"calico-apiserver-7bbb8745b8-4qk7z", "timestamp":"2025-03-17 19:07:31.552427752 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.564 [INFO][3943] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.564 [INFO][3943] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.565 [INFO][3943] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.567 [INFO][3943] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.572 [INFO][3943] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.576 [INFO][3943] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.577 [INFO][3943] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.579 [INFO][3943] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.579 [INFO][3943] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.581 [INFO][3943] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9 Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.585 [INFO][3943] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.594 [INFO][3943] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.2/26] block=192.168.32.0/26 handle="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.594 [INFO][3943] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.2/26] handle="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.594 [INFO][3943] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:31.631015 env[1440]: 2025-03-17 19:07:31.594 [INFO][3943] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.2/26] IPv6=[] ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" HandleID="k8s-pod-network.2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.596 [INFO][3931] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"68d0588d-642d-4254-b2a5-0d2f1345db5c", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"calico-apiserver-7bbb8745b8-4qk7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf6a68a922f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.596 [INFO][3931] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.2/32] ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.596 [INFO][3931] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibf6a68a922f ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.608 [INFO][3931] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.609 [INFO][3931] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"68d0588d-642d-4254-b2a5-0d2f1345db5c", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9", Pod:"calico-apiserver-7bbb8745b8-4qk7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf6a68a922f", MAC:"f2:41:4e:df:6c:ed", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:31.631826 env[1440]: 2025-03-17 19:07:31.628 [INFO][3931] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9" Namespace="calico-apiserver" Pod="calico-apiserver-7bbb8745b8-4qk7z" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:31.644000 audit[3963]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:31.644000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffcc632bce0 a2=0 a3=7ffcc632bccc items=0 ppid=3605 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.644000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:31.656107 env[1440]: time="2025-03-17T19:07:31.656028311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:31.656321 env[1440]: time="2025-03-17T19:07:31.656082712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:31.656321 env[1440]: time="2025-03-17T19:07:31.656096012Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:31.656321 env[1440]: time="2025-03-17T19:07:31.656225112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9 pid=3972 runtime=io.containerd.runc.v2 Mar 17 19:07:31.681176 systemd[1]: Started cri-containerd-2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9.scope. Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.692000 audit: BPF prog-id=166 op=LOAD Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3972 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643434646633383137376532636635333961303232353865363633 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3972 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643434646633383137376532636635333961303232353865363633 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit: BPF prog-id=167 op=LOAD Mar 17 19:07:31.693000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c9410 items=0 ppid=3972 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643434646633383137376532636635333961303232353865363633 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit: BPF prog-id=168 op=LOAD Mar 17 19:07:31.693000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c9458 items=0 ppid=3972 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643434646633383137376532636635333961303232353865363633 Mar 17 19:07:31.693000 audit: BPF prog-id=168 op=UNLOAD Mar 17 19:07:31.693000 audit: BPF prog-id=167 op=UNLOAD Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { perfmon } for pid=3983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit[3983]: AVC avc: denied { bpf } for pid=3983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:31.693000 audit: BPF prog-id=169 op=LOAD Mar 17 19:07:31.693000 audit[3983]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c9868 items=0 ppid=3972 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264643434646633383137376532636635333961303232353865363633 Mar 17 19:07:31.724627 env[1440]: time="2025-03-17T19:07:31.724058444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bbb8745b8-4qk7z,Uid:68d0588d-642d-4254-b2a5-0d2f1345db5c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9\"" Mar 17 19:07:32.103886 systemd-networkd[1590]: cali350a685ed58: Gained IPv6LL Mar 17 19:07:32.299297 env[1440]: time="2025-03-17T19:07:32.299247677Z" level=info msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" Mar 17 19:07:32.303823 env[1440]: time="2025-03-17T19:07:32.301833793Z" level=info msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.377 [INFO][4031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.377 [INFO][4031] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" iface="eth0" netns="/var/run/netns/cni-ddefeb44-89d3-e65e-83ac-07d1daba9ac2" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.378 [INFO][4031] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" iface="eth0" netns="/var/run/netns/cni-ddefeb44-89d3-e65e-83ac-07d1daba9ac2" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.378 [INFO][4031] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" iface="eth0" netns="/var/run/netns/cni-ddefeb44-89d3-e65e-83ac-07d1daba9ac2" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.378 [INFO][4031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.378 [INFO][4031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.408 [INFO][4047] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.409 [INFO][4047] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.409 [INFO][4047] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.415 [WARNING][4047] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.415 [INFO][4047] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.419 [INFO][4047] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:32.423303 env[1440]: 2025-03-17 19:07:32.421 [INFO][4031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:32.424172 env[1440]: time="2025-03-17T19:07:32.423730658Z" level=info msg="TearDown network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" successfully" Mar 17 19:07:32.424172 env[1440]: time="2025-03-17T19:07:32.423793258Z" level=info msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" returns successfully" Mar 17 19:07:32.424798 env[1440]: time="2025-03-17T19:07:32.424757964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b8dfbdb96-cscjj,Uid:c1441905-37cb-4b72-ac35-ecbf4670d6d7,Namespace:calico-system,Attempt:1,}" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.400 [INFO][4039] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.400 [INFO][4039] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" iface="eth0" netns="/var/run/netns/cni-647d8f68-4d60-1ff8-3e63-61c71bb69cf8" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.401 [INFO][4039] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" iface="eth0" netns="/var/run/netns/cni-647d8f68-4d60-1ff8-3e63-61c71bb69cf8" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.401 [INFO][4039] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" iface="eth0" netns="/var/run/netns/cni-647d8f68-4d60-1ff8-3e63-61c71bb69cf8" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.401 [INFO][4039] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.401 [INFO][4039] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.439 [INFO][4052] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.439 [INFO][4052] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.439 [INFO][4052] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.445 [WARNING][4052] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.445 [INFO][4052] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.446 [INFO][4052] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:32.448926 env[1440]: 2025-03-17 19:07:32.447 [INFO][4039] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:32.453667 env[1440]: time="2025-03-17T19:07:32.449074117Z" level=info msg="TearDown network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" successfully" Mar 17 19:07:32.453667 env[1440]: time="2025-03-17T19:07:32.449124917Z" level=info msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" returns successfully" Mar 17 19:07:32.452902 systemd[1]: run-netns-cni\x2dddefeb44\x2d89d3\x2de65e\x2d83ac\x2d07d1daba9ac2.mount: Deactivated successfully. Mar 17 19:07:32.453011 systemd[1]: run-netns-cni\x2d647d8f68\x2d4d60\x2d1ff8\x2d3e63\x2d61c71bb69cf8.mount: Deactivated successfully. Mar 17 19:07:32.455902 env[1440]: time="2025-03-17T19:07:32.455705358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xxwnb,Uid:db7ba6a4-40d0-466b-baaa-53e5a7ec7d58,Namespace:kube-system,Attempt:1,}" Mar 17 19:07:32.861558 systemd-networkd[1590]: cali8bbabeac5b8: Link UP Mar 17 19:07:32.869808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:07:32.879720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8bbabeac5b8: link becomes ready Mar 17 19:07:32.883173 systemd-networkd[1590]: cali8bbabeac5b8: Gained carrier Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.690 [INFO][4059] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0 calico-kube-controllers-7b8dfbdb96- calico-system c1441905-37cb-4b72-ac35-ecbf4670d6d7 764 0 2025-03-17 19:07:02 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7b8dfbdb96 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd calico-kube-controllers-7b8dfbdb96-cscjj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali8bbabeac5b8 [] []}} ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.690 [INFO][4059] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.794 [INFO][4082] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" HandleID="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.811 [INFO][4082] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" HandleID="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"calico-kube-controllers-7b8dfbdb96-cscjj", "timestamp":"2025-03-17 19:07:32.794295282 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.812 [INFO][4082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.812 [INFO][4082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.812 [INFO][4082] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.814 [INFO][4082] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.819 [INFO][4082] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.824 [INFO][4082] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.829 [INFO][4082] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.832 [INFO][4082] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.832 [INFO][4082] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.833 [INFO][4082] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.839 [INFO][4082] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.850 [INFO][4082] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.3/26] block=192.168.32.0/26 handle="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.850 [INFO][4082] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.3/26] handle="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.850 [INFO][4082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:32.906643 env[1440]: 2025-03-17 19:07:32.850 [INFO][4082] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.3/26] IPv6=[] ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" HandleID="k8s-pod-network.d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.853 [INFO][4059] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0", GenerateName:"calico-kube-controllers-7b8dfbdb96-", Namespace:"calico-system", SelfLink:"", UID:"c1441905-37cb-4b72-ac35-ecbf4670d6d7", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b8dfbdb96", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"calico-kube-controllers-7b8dfbdb96-cscjj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8bbabeac5b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.853 [INFO][4059] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.3/32] ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.853 [INFO][4059] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8bbabeac5b8 ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.883 [INFO][4059] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.884 [INFO][4059] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0", GenerateName:"calico-kube-controllers-7b8dfbdb96-", Namespace:"calico-system", SelfLink:"", UID:"c1441905-37cb-4b72-ac35-ecbf4670d6d7", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b8dfbdb96", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b", Pod:"calico-kube-controllers-7b8dfbdb96-cscjj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8bbabeac5b8", MAC:"26:d6:8f:7c:73:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:32.907452 env[1440]: 2025-03-17 19:07:32.904 [INFO][4059] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b" Namespace="calico-system" Pod="calico-kube-controllers-7b8dfbdb96-cscjj" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:32.930000 audit[4106]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:32.930000 audit[4106]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffc99145730 a2=0 a3=7ffc9914571c items=0 ppid=3605 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:32.930000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:32.946597 env[1440]: time="2025-03-17T19:07:32.945235529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:32.946597 env[1440]: time="2025-03-17T19:07:32.946384336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:32.946597 env[1440]: time="2025-03-17T19:07:32.946401836Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:32.947190 env[1440]: time="2025-03-17T19:07:32.946983240Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b pid=4117 runtime=io.containerd.runc.v2 Mar 17 19:07:32.964923 systemd-networkd[1590]: caliab395bda5f8: Link UP Mar 17 19:07:32.975464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab395bda5f8: link becomes ready Mar 17 19:07:32.978233 systemd-networkd[1590]: caliab395bda5f8: Gained carrier Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.721 [INFO][4068] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0 coredns-6f6b679f8f- kube-system db7ba6a4-40d0-466b-baaa-53e5a7ec7d58 765 0 2025-03-17 19:06:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd coredns-6f6b679f8f-xxwnb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliab395bda5f8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.722 [INFO][4068] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.793 [INFO][4086] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" HandleID="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.812 [INFO][4086] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" HandleID="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334d90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"coredns-6f6b679f8f-xxwnb", "timestamp":"2025-03-17 19:07:32.792923574 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.812 [INFO][4086] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.850 [INFO][4086] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.850 [INFO][4086] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.915 [INFO][4086] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.922 [INFO][4086] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.929 [INFO][4086] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.933 [INFO][4086] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.936 [INFO][4086] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.936 [INFO][4086] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.938 [INFO][4086] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.946 [INFO][4086] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.955 [INFO][4086] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.4/26] block=192.168.32.0/26 handle="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.955 [INFO][4086] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.4/26] handle="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.955 [INFO][4086] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:32.996820 env[1440]: 2025-03-17 19:07:32.955 [INFO][4086] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.4/26] IPv6=[] ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" HandleID="k8s-pod-network.56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.958 [INFO][4068] cni-plugin/k8s.go 386: Populated endpoint ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"coredns-6f6b679f8f-xxwnb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab395bda5f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.958 [INFO][4068] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.4/32] ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.958 [INFO][4068] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliab395bda5f8 ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.980 [INFO][4068] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.980 [INFO][4068] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e", Pod:"coredns-6f6b679f8f-xxwnb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab395bda5f8", MAC:"da:4b:ef:65:a7:93", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:32.997550 env[1440]: 2025-03-17 19:07:32.995 [INFO][4068] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e" Namespace="kube-system" Pod="coredns-6f6b679f8f-xxwnb" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:33.002734 systemd-networkd[1590]: calibf6a68a922f: Gained IPv6LL Mar 17 19:07:33.003004 systemd-networkd[1590]: vxlan.calico: Gained IPv6LL Mar 17 19:07:33.013044 systemd[1]: Started cri-containerd-d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b.scope. Mar 17 19:07:33.062554 env[1440]: time="2025-03-17T19:07:33.062477959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:33.062852 env[1440]: time="2025-03-17T19:07:33.062816461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:33.063011 env[1440]: time="2025-03-17T19:07:33.062974762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:33.063330 env[1440]: time="2025-03-17T19:07:33.063288864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e pid=4157 runtime=io.containerd.runc.v2 Mar 17 19:07:33.074000 audit[4162]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:33.074000 audit[4162]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffda299b390 a2=0 a3=7ffda299b37c items=0 ppid=3605 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.074000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:33.088454 systemd[1]: Started cri-containerd-56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e.scope. Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.094000 audit: BPF prog-id=170 op=LOAD Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4117 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437616534656630323837663364336538326132376561356163616364 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4117 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437616534656630323837663364336538326132376561356163616364 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.095000 audit: BPF prog-id=171 op=LOAD Mar 17 19:07:33.095000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003fac80 items=0 ppid=4117 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437616534656630323837663364336538326132376561356163616364 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit: BPF prog-id=172 op=LOAD Mar 17 19:07:33.097000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003facc8 items=0 ppid=4117 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437616534656630323837663364336538326132376561356163616364 Mar 17 19:07:33.097000 audit: BPF prog-id=172 op=UNLOAD Mar 17 19:07:33.097000 audit: BPF prog-id=171 op=UNLOAD Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.097000 audit: BPF prog-id=173 op=LOAD Mar 17 19:07:33.097000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003fb0d8 items=0 ppid=4117 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437616534656630323837663364336538326132376561356163616364 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.119000 audit: BPF prog-id=174 op=LOAD Mar 17 19:07:33.124000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.124000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4157 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653761356664323334356535616264653239333364376433393666 Mar 17 19:07:33.124000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.124000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4157 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653761356664323334356535616264653239333364376433393666 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit: BPF prog-id=175 op=LOAD Mar 17 19:07:33.126000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020eb00 items=0 ppid=4157 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653761356664323334356535616264653239333364376433393666 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit: BPF prog-id=176 op=LOAD Mar 17 19:07:33.126000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020eb48 items=0 ppid=4157 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653761356664323334356535616264653239333364376433393666 Mar 17 19:07:33.126000 audit: BPF prog-id=176 op=UNLOAD Mar 17 19:07:33.126000 audit: BPF prog-id=175 op=UNLOAD Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.126000 audit: BPF prog-id=177 op=LOAD Mar 17 19:07:33.126000 audit[4166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020ef58 items=0 ppid=4157 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536653761356664323334356535616264653239333364376433393666 Mar 17 19:07:33.189248 env[1440]: time="2025-03-17T19:07:33.189168543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xxwnb,Uid:db7ba6a4-40d0-466b-baaa-53e5a7ec7d58,Namespace:kube-system,Attempt:1,} returns sandbox id \"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e\"" Mar 17 19:07:33.197108 env[1440]: time="2025-03-17T19:07:33.196312687Z" level=info msg="CreateContainer within sandbox \"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 19:07:33.201193 env[1440]: time="2025-03-17T19:07:33.201152217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7b8dfbdb96-cscjj,Uid:c1441905-37cb-4b72-ac35-ecbf4670d6d7,Namespace:calico-system,Attempt:1,} returns sandbox id \"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b\"" Mar 17 19:07:33.520895 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount307359164.mount: Deactivated successfully. Mar 17 19:07:33.604515 env[1440]: time="2025-03-17T19:07:33.604449512Z" level=info msg="CreateContainer within sandbox \"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7bf0d33db0b97816d37bed4726067a2ec8cd0e318334e0fd1cdb534d992dcbb3\"" Mar 17 19:07:33.607337 env[1440]: time="2025-03-17T19:07:33.607292330Z" level=info msg="StartContainer for \"7bf0d33db0b97816d37bed4726067a2ec8cd0e318334e0fd1cdb534d992dcbb3\"" Mar 17 19:07:33.638699 systemd[1]: Started cri-containerd-7bf0d33db0b97816d37bed4726067a2ec8cd0e318334e0fd1cdb534d992dcbb3.scope. Mar 17 19:07:33.684768 kernel: kauditd_printk_skb: 791 callbacks suppressed Mar 17 19:07:33.684925 kernel: audit: type=1400 audit(1742238453.657:1175): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.722287 kernel: audit: type=1400 audit(1742238453.657:1176): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.722423 kernel: audit: type=1400 audit(1742238453.657:1177): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.759682 kernel: audit: type=1400 audit(1742238453.657:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.759827 kernel: audit: type=1400 audit(1742238453.657:1179): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.779035 kernel: audit: type=1400 audit(1742238453.657:1180): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.779388 env[1440]: time="2025-03-17T19:07:33.766045212Z" level=info msg="StartContainer for \"7bf0d33db0b97816d37bed4726067a2ec8cd0e318334e0fd1cdb534d992dcbb3\" returns successfully" Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.799897 kernel: audit: type=1400 audit(1742238453.657:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.819679 kernel: audit: type=1400 audit(1742238453.657:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.838694 kernel: audit: type=1400 audit(1742238453.657:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.857887 kernel: audit: type=1400 audit(1742238453.657:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.657000 audit: BPF prog-id=178 op=LOAD Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4157 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663064333364623062393738313664333762656434373236303637 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4157 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663064333364623062393738313664333762656434373236303637 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.683000 audit: BPF prog-id=179 op=LOAD Mar 17 19:07:33.683000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00026e010 items=0 ppid=4157 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663064333364623062393738313664333762656434373236303637 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit: BPF prog-id=180 op=LOAD Mar 17 19:07:33.684000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00026e058 items=0 ppid=4157 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663064333364623062393738313664333762656434373236303637 Mar 17 19:07:33.684000 audit: BPF prog-id=180 op=UNLOAD Mar 17 19:07:33.684000 audit: BPF prog-id=179 op=UNLOAD Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { perfmon } for pid=4215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit[4215]: AVC avc: denied { bpf } for pid=4215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:33.684000 audit: BPF prog-id=181 op=LOAD Mar 17 19:07:33.684000 audit[4215]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00026e468 items=0 ppid=4157 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:33.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762663064333364623062393738313664333762656434373236303637 Mar 17 19:07:33.960962 systemd-networkd[1590]: cali8bbabeac5b8: Gained IPv6LL Mar 17 19:07:34.297790 env[1440]: time="2025-03-17T19:07:34.297731376Z" level=info msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.409 [INFO][4258] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.410 [INFO][4258] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" iface="eth0" netns="/var/run/netns/cni-0f463ec6-6442-0744-c106-f87099cbee63" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.410 [INFO][4258] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" iface="eth0" netns="/var/run/netns/cni-0f463ec6-6442-0744-c106-f87099cbee63" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.411 [INFO][4258] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" iface="eth0" netns="/var/run/netns/cni-0f463ec6-6442-0744-c106-f87099cbee63" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.411 [INFO][4258] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.411 [INFO][4258] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.457 [INFO][4264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.459 [INFO][4264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.459 [INFO][4264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.466 [WARNING][4264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.466 [INFO][4264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.467 [INFO][4264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:34.471130 env[1440]: 2025-03-17 19:07:34.469 [INFO][4258] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:34.474890 systemd[1]: run-netns-cni\x2d0f463ec6\x2d6442\x2d0744\x2dc106\x2df87099cbee63.mount: Deactivated successfully. Mar 17 19:07:34.476772 env[1440]: time="2025-03-17T19:07:34.476703169Z" level=info msg="TearDown network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" successfully" Mar 17 19:07:34.476772 env[1440]: time="2025-03-17T19:07:34.476769469Z" level=info msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" returns successfully" Mar 17 19:07:34.477914 env[1440]: time="2025-03-17T19:07:34.477874476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qb7c6,Uid:bdab152a-52ca-410d-bbdc-a0b9b3d6c800,Namespace:kube-system,Attempt:1,}" Mar 17 19:07:34.589557 kubelet[2476]: I0317 19:07:34.589472 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-xxwnb" podStartSLOduration=43.589446957 podStartE2EDuration="43.589446957s" podCreationTimestamp="2025-03-17 19:06:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:07:34.548568307 +0000 UTC m=+48.382534884" watchObservedRunningTime="2025-03-17 19:07:34.589446957 +0000 UTC m=+48.423413634" Mar 17 19:07:34.664340 systemd-networkd[1590]: caliab395bda5f8: Gained IPv6LL Mar 17 19:07:34.841000 audit[4290]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:34.841000 audit[4290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd2b9c5bb0 a2=0 a3=7ffd2b9c5b9c items=0 ppid=2581 pid=4290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:34.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:34.846000 audit[4290]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:34.846000 audit[4290]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd2b9c5bb0 a2=0 a3=0 items=0 ppid=2581 pid=4290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:34.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:34.868428 systemd-networkd[1590]: cali169b1de4852: Link UP Mar 17 19:07:34.877000 audit[4292]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:34.877000 audit[4292]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd48110a00 a2=0 a3=7ffd481109ec items=0 ppid=2581 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:34.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:34.881940 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 19:07:34.884923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali169b1de4852: link becomes ready Mar 17 19:07:34.883944 systemd-networkd[1590]: cali169b1de4852: Gained carrier Mar 17 19:07:34.887000 audit[4292]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:34.887000 audit[4292]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd48110a00 a2=0 a3=7ffd481109ec items=0 ppid=2581 pid=4292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:34.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.663 [INFO][4270] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0 coredns-6f6b679f8f- kube-system bdab152a-52ca-410d-bbdc-a0b9b3d6c800 781 0 2025-03-17 19:06:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd coredns-6f6b679f8f-qb7c6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali169b1de4852 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.665 [INFO][4270] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.748 [INFO][4283] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" HandleID="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.774 [INFO][4283] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" HandleID="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003117d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"coredns-6f6b679f8f-qb7c6", "timestamp":"2025-03-17 19:07:34.748831229 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.775 [INFO][4283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.775 [INFO][4283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.775 [INFO][4283] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.780 [INFO][4283] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.806 [INFO][4283] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.820 [INFO][4283] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.824 [INFO][4283] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.835 [INFO][4283] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.835 [INFO][4283] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.844 [INFO][4283] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887 Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.850 [INFO][4283] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.863 [INFO][4283] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.5/26] block=192.168.32.0/26 handle="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.863 [INFO][4283] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.5/26] handle="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.863 [INFO][4283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:34.910435 env[1440]: 2025-03-17 19:07:34.863 [INFO][4283] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.5/26] IPv6=[] ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" HandleID="k8s-pod-network.a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.865 [INFO][4270] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bdab152a-52ca-410d-bbdc-a0b9b3d6c800", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"coredns-6f6b679f8f-qb7c6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali169b1de4852", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.865 [INFO][4270] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.5/32] ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.865 [INFO][4270] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali169b1de4852 ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.888 [INFO][4270] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.890 [INFO][4270] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bdab152a-52ca-410d-bbdc-a0b9b3d6c800", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887", Pod:"coredns-6f6b679f8f-qb7c6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali169b1de4852", MAC:"26:d3:80:a0:4c:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:34.911698 env[1440]: 2025-03-17 19:07:34.907 [INFO][4270] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887" Namespace="kube-system" Pod="coredns-6f6b679f8f-qb7c6" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:34.936000 audit[4306]: NETFILTER_CFG table=filter:111 family=2 entries=42 op=nft_register_chain pid=4306 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:34.936000 audit[4306]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffe7fadb9b0 a2=0 a3=7ffe7fadb99c items=0 ppid=3605 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:34.936000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:34.950024 env[1440]: time="2025-03-17T19:07:34.949948257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:34.951726 env[1440]: time="2025-03-17T19:07:34.951628867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:34.951726 env[1440]: time="2025-03-17T19:07:34.951690567Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:34.951963 env[1440]: time="2025-03-17T19:07:34.951714067Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:34.952217 env[1440]: time="2025-03-17T19:07:34.952145970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887 pid=4314 runtime=io.containerd.runc.v2 Mar 17 19:07:34.962856 env[1440]: time="2025-03-17T19:07:34.962815235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:34.970663 env[1440]: time="2025-03-17T19:07:34.970606383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:34.975842 env[1440]: time="2025-03-17T19:07:34.975807915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:34.979703 systemd[1]: Started cri-containerd-a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887.scope. Mar 17 19:07:34.985678 env[1440]: time="2025-03-17T19:07:34.983414461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 19:07:34.995676 env[1440]: time="2025-03-17T19:07:34.993713624Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 19:07:34.997679 env[1440]: time="2025-03-17T19:07:34.997244045Z" level=info msg="CreateContainer within sandbox \"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.016000 audit: BPF prog-id=182 op=LOAD Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4314 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136656463373861383839383331363866393339383931326430666463 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4314 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136656463373861383839383331363866393339383931326430666463 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit: BPF prog-id=183 op=LOAD Mar 17 19:07:35.018000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002e1fe0 items=0 ppid=4314 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136656463373861383839383331363866393339383931326430666463 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit: BPF prog-id=184 op=LOAD Mar 17 19:07:35.018000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003de028 items=0 ppid=4314 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136656463373861383839383331363866393339383931326430666463 Mar 17 19:07:35.018000 audit: BPF prog-id=184 op=UNLOAD Mar 17 19:07:35.018000 audit: BPF prog-id=183 op=UNLOAD Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.018000 audit: BPF prog-id=185 op=LOAD Mar 17 19:07:35.018000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003de438 items=0 ppid=4314 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136656463373861383839383331363866393339383931326430666463 Mar 17 19:07:35.050952 env[1440]: time="2025-03-17T19:07:35.049470260Z" level=info msg="CreateContainer within sandbox \"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9126d785e2e99cb9856bf3a40ec523f9e5f630a430c38914ab42d82315310137\"" Mar 17 19:07:35.051610 env[1440]: time="2025-03-17T19:07:35.050990969Z" level=info msg="StartContainer for \"9126d785e2e99cb9856bf3a40ec523f9e5f630a430c38914ab42d82315310137\"" Mar 17 19:07:35.075032 env[1440]: time="2025-03-17T19:07:35.074964614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-qb7c6,Uid:bdab152a-52ca-410d-bbdc-a0b9b3d6c800,Namespace:kube-system,Attempt:1,} returns sandbox id \"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887\"" Mar 17 19:07:35.078666 env[1440]: time="2025-03-17T19:07:35.078609436Z" level=info msg="CreateContainer within sandbox \"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 19:07:35.088465 systemd[1]: Started cri-containerd-9126d785e2e99cb9856bf3a40ec523f9e5f630a430c38914ab42d82315310137.scope. Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit: BPF prog-id=186 op=LOAD Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3800 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323664373835653265393963623938353662663361343065633532 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3800 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323664373835653265393963623938353662663361343065633532 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.107000 audit: BPF prog-id=187 op=LOAD Mar 17 19:07:35.107000 audit[4353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027deb0 items=0 ppid=3800 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323664373835653265393963623938353662663361343065633532 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit: BPF prog-id=188 op=LOAD Mar 17 19:07:35.108000 audit[4353]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027def8 items=0 ppid=3800 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323664373835653265393963623938353662663361343065633532 Mar 17 19:07:35.108000 audit: BPF prog-id=188 op=UNLOAD Mar 17 19:07:35.108000 audit: BPF prog-id=187 op=UNLOAD Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { perfmon } for pid=4353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit[4353]: AVC avc: denied { bpf } for pid=4353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.108000 audit: BPF prog-id=189 op=LOAD Mar 17 19:07:35.108000 audit[4353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da308 items=0 ppid=3800 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323664373835653265393963623938353662663361343065633532 Mar 17 19:07:35.137933 env[1440]: time="2025-03-17T19:07:35.137879593Z" level=info msg="CreateContainer within sandbox \"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"901cae8301df70857dc93c48a30c4aa1c5f8661618b9accf057a82e120c87e0d\"" Mar 17 19:07:35.139704 env[1440]: time="2025-03-17T19:07:35.139669603Z" level=info msg="StartContainer for \"901cae8301df70857dc93c48a30c4aa1c5f8661618b9accf057a82e120c87e0d\"" Mar 17 19:07:35.156045 env[1440]: time="2025-03-17T19:07:35.155998502Z" level=info msg="StartContainer for \"9126d785e2e99cb9856bf3a40ec523f9e5f630a430c38914ab42d82315310137\" returns successfully" Mar 17 19:07:35.166836 systemd[1]: Started cri-containerd-901cae8301df70857dc93c48a30c4aa1c5f8661618b9accf057a82e120c87e0d.scope. Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.191000 audit: BPF prog-id=190 op=LOAD Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4314 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930316361653833303164663730383537646339336334386133306334 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4314 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930316361653833303164663730383537646339336334386133306334 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit: BPF prog-id=191 op=LOAD Mar 17 19:07:35.192000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000259d40 items=0 ppid=4314 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930316361653833303164663730383537646339336334386133306334 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit: BPF prog-id=192 op=LOAD Mar 17 19:07:35.192000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000259d88 items=0 ppid=4314 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930316361653833303164663730383537646339336334386133306334 Mar 17 19:07:35.192000 audit: BPF prog-id=192 op=UNLOAD Mar 17 19:07:35.192000 audit: BPF prog-id=191 op=UNLOAD Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { perfmon } for pid=4390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit[4390]: AVC avc: denied { bpf } for pid=4390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.192000 audit: BPF prog-id=193 op=LOAD Mar 17 19:07:35.192000 audit[4390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a8198 items=0 ppid=4314 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930316361653833303164663730383537646339336334386133306334 Mar 17 19:07:35.216589 env[1440]: time="2025-03-17T19:07:35.216526366Z" level=info msg="StartContainer for \"901cae8301df70857dc93c48a30c4aa1c5f8661618b9accf057a82e120c87e0d\" returns successfully" Mar 17 19:07:35.294532 env[1440]: time="2025-03-17T19:07:35.294480436Z" level=info msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" Mar 17 19:07:35.387709 env[1440]: time="2025-03-17T19:07:35.383963674Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:35.399316 env[1440]: time="2025-03-17T19:07:35.399265167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:35.406489 env[1440]: time="2025-03-17T19:07:35.406443710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:35.413592 env[1440]: time="2025-03-17T19:07:35.413547753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:35.413904 env[1440]: time="2025-03-17T19:07:35.413871655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 19:07:35.417792 env[1440]: time="2025-03-17T19:07:35.417759478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Mar 17 19:07:35.420504 env[1440]: time="2025-03-17T19:07:35.420471994Z" level=info msg="CreateContainer within sandbox \"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.362 [INFO][4438] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.362 [INFO][4438] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" iface="eth0" netns="/var/run/netns/cni-0a50731f-92f2-d48c-5e96-a82c009e4555" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.362 [INFO][4438] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" iface="eth0" netns="/var/run/netns/cni-0a50731f-92f2-d48c-5e96-a82c009e4555" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.363 [INFO][4438] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" iface="eth0" netns="/var/run/netns/cni-0a50731f-92f2-d48c-5e96-a82c009e4555" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.363 [INFO][4438] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.363 [INFO][4438] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.421 [INFO][4445] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.421 [INFO][4445] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.421 [INFO][4445] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.437 [WARNING][4445] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.437 [INFO][4445] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.439 [INFO][4445] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:35.443027 env[1440]: 2025-03-17 19:07:35.441 [INFO][4438] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:35.443747 env[1440]: time="2025-03-17T19:07:35.443153331Z" level=info msg="TearDown network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" successfully" Mar 17 19:07:35.443747 env[1440]: time="2025-03-17T19:07:35.443193531Z" level=info msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" returns successfully" Mar 17 19:07:35.445159 env[1440]: time="2025-03-17T19:07:35.445117043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r26l7,Uid:305fb96c-f6b0-4e24-9c8d-d76d5088c95d,Namespace:calico-system,Attempt:1,}" Mar 17 19:07:35.462661 systemd[1]: run-netns-cni\x2d0a50731f\x2d92f2\x2dd48c\x2d5e96\x2da82c009e4555.mount: Deactivated successfully. Mar 17 19:07:35.479740 env[1440]: time="2025-03-17T19:07:35.479642851Z" level=info msg="CreateContainer within sandbox \"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5e1f59073927e70fe74bdbd6066acad456bd5b6445c6f5ba8537123c181ae554\"" Mar 17 19:07:35.481131 env[1440]: time="2025-03-17T19:07:35.481094359Z" level=info msg="StartContainer for \"5e1f59073927e70fe74bdbd6066acad456bd5b6445c6f5ba8537123c181ae554\"" Mar 17 19:07:35.541055 systemd[1]: Started cri-containerd-5e1f59073927e70fe74bdbd6066acad456bd5b6445c6f5ba8537123c181ae554.scope. Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.624000 audit: BPF prog-id=194 op=LOAD Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=3972 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565316635393037333932376537306665373462646264363036366163 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=3972 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565316635393037333932376537306665373462646264363036366163 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.626000 audit: BPF prog-id=195 op=LOAD Mar 17 19:07:35.626000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c0003d4c30 items=0 ppid=3972 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565316635393037333932376537306665373462646264363036366163 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.627000 audit: BPF prog-id=196 op=LOAD Mar 17 19:07:35.627000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0003d4c78 items=0 ppid=3972 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565316635393037333932376537306665373462646264363036366163 Mar 17 19:07:35.630000 audit: BPF prog-id=196 op=UNLOAD Mar 17 19:07:35.630000 audit: BPF prog-id=195 op=UNLOAD Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { perfmon } for pid=4460 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit[4460]: AVC avc: denied { bpf } for pid=4460 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.630000 audit: BPF prog-id=197 op=LOAD Mar 17 19:07:35.630000 audit[4460]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003d5088 items=0 ppid=3972 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565316635393037333932376537306665373462646264363036366163 Mar 17 19:07:35.640876 kubelet[2476]: I0317 19:07:35.640030 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bbb8745b8-l7fdg" podStartSLOduration=29.575639473 podStartE2EDuration="33.640005616s" podCreationTimestamp="2025-03-17 19:07:02 +0000 UTC" firstStartedPulling="2025-03-17 19:07:30.928008473 +0000 UTC m=+44.761975050" lastFinishedPulling="2025-03-17 19:07:34.992374616 +0000 UTC m=+48.826341193" observedRunningTime="2025-03-17 19:07:35.59408254 +0000 UTC m=+49.428049117" watchObservedRunningTime="2025-03-17 19:07:35.640005616 +0000 UTC m=+49.473972193" Mar 17 19:07:35.640876 kubelet[2476]: I0317 19:07:35.640546 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-qb7c6" podStartSLOduration=44.640535019 podStartE2EDuration="44.640535019s" podCreationTimestamp="2025-03-17 19:06:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 19:07:35.638848709 +0000 UTC m=+49.472815286" watchObservedRunningTime="2025-03-17 19:07:35.640535019 +0000 UTC m=+49.474501696" Mar 17 19:07:35.701000 audit[4497]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:35.701000 audit[4497]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff8a13cb70 a2=0 a3=7fff8a13cb5c items=0 ppid=2581 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:35.708772 env[1440]: time="2025-03-17T19:07:35.708711630Z" level=info msg="StartContainer for \"5e1f59073927e70fe74bdbd6066acad456bd5b6445c6f5ba8537123c181ae554\" returns successfully" Mar 17 19:07:35.711000 audit[4497]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:35.711000 audit[4497]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff8a13cb70 a2=0 a3=7fff8a13cb5c items=0 ppid=2581 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:35.822092 systemd-networkd[1590]: cali5e489facaae: Link UP Mar 17 19:07:35.832545 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5e489facaae: link becomes ready Mar 17 19:07:35.833171 systemd-networkd[1590]: cali5e489facaae: Gained carrier Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.676 [INFO][4469] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0 csi-node-driver- calico-system 305fb96c-f6b0-4e24-9c8d-d76d5088c95d 802 0 2025-03-17 19:07:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-a-9eb0e2b4dd csi-node-driver-r26l7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5e489facaae [] []}} ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.677 [INFO][4469] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.742 [INFO][4498] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" HandleID="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.762 [INFO][4498] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" HandleID="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318a50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-a-9eb0e2b4dd", "pod":"csi-node-driver-r26l7", "timestamp":"2025-03-17 19:07:35.742526334 +0000 UTC"}, Hostname:"ci-3510.3.7-a-9eb0e2b4dd", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.763 [INFO][4498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.763 [INFO][4498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.763 [INFO][4498] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-a-9eb0e2b4dd' Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.770 [INFO][4498] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.778 [INFO][4498] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.784 [INFO][4498] ipam/ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.788 [INFO][4498] ipam/ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.792 [INFO][4498] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.792 [INFO][4498] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.795 [INFO][4498] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01 Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.802 [INFO][4498] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.816 [INFO][4498] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.32.6/26] block=192.168.32.0/26 handle="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.816 [INFO][4498] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.6/26] handle="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" host="ci-3510.3.7-a-9eb0e2b4dd" Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.816 [INFO][4498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:35.854828 env[1440]: 2025-03-17 19:07:35.816 [INFO][4498] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.32.6/26] IPv6=[] ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" HandleID="k8s-pod-network.3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.818 [INFO][4469] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"305fb96c-f6b0-4e24-9c8d-d76d5088c95d", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"", Pod:"csi-node-driver-r26l7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e489facaae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.818 [INFO][4469] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.32.6/32] ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.818 [INFO][4469] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5e489facaae ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.834 [INFO][4469] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.834 [INFO][4469] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"305fb96c-f6b0-4e24-9c8d-d76d5088c95d", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01", Pod:"csi-node-driver-r26l7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e489facaae", MAC:"7e:b9:56:30:b7:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:35.855840 env[1440]: 2025-03-17 19:07:35.852 [INFO][4469] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01" Namespace="calico-system" Pod="csi-node-driver-r26l7" WorkloadEndpoint="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:35.877749 env[1440]: time="2025-03-17T19:07:35.877678147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 19:07:35.877952 env[1440]: time="2025-03-17T19:07:35.877929249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 19:07:35.878073 env[1440]: time="2025-03-17T19:07:35.878052550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 19:07:35.879782 env[1440]: time="2025-03-17T19:07:35.879729260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01 pid=4529 runtime=io.containerd.runc.v2 Mar 17 19:07:35.902858 systemd[1]: Started cri-containerd-3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01.scope. Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.949000 audit: BPF prog-id=198 op=LOAD Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4529 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353464333961616434653132336239393761646332313261353333 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4529 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353464333961616434653132336239393761646332313261353333 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit: BPF prog-id=199 op=LOAD Mar 17 19:07:35.950000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b1390 items=0 ppid=4529 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353464333961616434653132336239393761646332313261353333 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit: BPF prog-id=200 op=LOAD Mar 17 19:07:35.950000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b13d8 items=0 ppid=4529 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353464333961616434653132336239393761646332313261353333 Mar 17 19:07:35.950000 audit: BPF prog-id=200 op=UNLOAD Mar 17 19:07:35.950000 audit: BPF prog-id=199 op=UNLOAD Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:35.950000 audit: BPF prog-id=201 op=LOAD Mar 17 19:07:35.950000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b17e8 items=0 ppid=4529 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331353464333961616434653132336239393761646332313261353333 Mar 17 19:07:35.959000 audit[4556]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=4556 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 19:07:35.959000 audit[4556]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffd5d4face0 a2=0 a3=7ffd5d4faccc items=0 ppid=3605 pid=4556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:35.959000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 19:07:35.978121 env[1440]: time="2025-03-17T19:07:35.978066352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r26l7,Uid:305fb96c-f6b0-4e24-9c8d-d76d5088c95d,Namespace:calico-system,Attempt:1,} returns sandbox id \"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01\"" Mar 17 19:07:36.071935 systemd-networkd[1590]: cali169b1de4852: Gained IPv6LL Mar 17 19:07:36.568542 kubelet[2476]: I0317 19:07:36.568507 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 19:07:36.605000 audit[4571]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:36.605000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff8e5b1bb0 a2=0 a3=7fff8e5b1b9c items=0 ppid=2581 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:36.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:36.632000 audit[4571]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:36.632000 audit[4571]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff8e5b1bb0 a2=0 a3=7fff8e5b1b9c items=0 ppid=2581 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:36.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:36.764000 audit[4366]: AVC avc: denied { watch } for pid=4366 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.2215373127/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c833,c943 tclass=file permissive=0 Mar 17 19:07:36.764000 audit[4366]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d3c8e0 a2=fc6 a3=0 items=0 ppid=3800 pid=4366 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 key=(null) Mar 17 19:07:36.764000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:07:37.037000 audit[4479]: AVC avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:07:37.037000 audit[4479]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00070faa0 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:07:37.037000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:07:37.073845 kubelet[2476]: I0317 19:07:37.073768 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bbb8745b8-4qk7z" podStartSLOduration=31.383228146 podStartE2EDuration="35.07374406s" podCreationTimestamp="2025-03-17 19:07:02 +0000 UTC" firstStartedPulling="2025-03-17 19:07:31.726200658 +0000 UTC m=+45.560167235" lastFinishedPulling="2025-03-17 19:07:35.416716572 +0000 UTC m=+49.250683149" observedRunningTime="2025-03-17 19:07:36.581900743 +0000 UTC m=+50.415867420" watchObservedRunningTime="2025-03-17 19:07:37.07374406 +0000 UTC m=+50.907710637" Mar 17 19:07:37.645000 audit[4574]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:37.645000 audit[4574]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe95f9df30 a2=0 a3=7ffe95f9df1c items=0 ppid=2581 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:37.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:37.651000 audit[4574]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:07:37.651000 audit[4574]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe95f9df30 a2=0 a3=7ffe95f9df1c items=0 ppid=2581 pid=4574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:37.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:07:37.863859 systemd-networkd[1590]: cali5e489facaae: Gained IPv6LL Mar 17 19:07:38.841804 env[1440]: time="2025-03-17T19:07:38.841753671Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:38.849841 env[1440]: time="2025-03-17T19:07:38.849791518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:38.854406 env[1440]: time="2025-03-17T19:07:38.854367544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:38.858510 env[1440]: time="2025-03-17T19:07:38.858474468Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:38.858983 env[1440]: time="2025-03-17T19:07:38.858946871Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Mar 17 19:07:38.860959 env[1440]: time="2025-03-17T19:07:38.860916582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 19:07:38.881922 env[1440]: time="2025-03-17T19:07:38.881852704Z" level=info msg="CreateContainer within sandbox \"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Mar 17 19:07:38.927330 env[1440]: time="2025-03-17T19:07:38.927270267Z" level=info msg="CreateContainer within sandbox \"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d\"" Mar 17 19:07:38.928963 env[1440]: time="2025-03-17T19:07:38.928058971Z" level=info msg="StartContainer for \"8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d\"" Mar 17 19:07:38.963875 systemd[1]: Started cri-containerd-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d.scope. Mar 17 19:07:38.992590 kernel: kauditd_printk_skb: 374 callbacks suppressed Mar 17 19:07:38.992798 kernel: audit: type=1400 audit(1742238458.973:1297): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.006877 kernel: audit: type=1400 audit(1742238458.973:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.019764 kernel: audit: type=1400 audit(1742238458.973:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.033691 kernel: audit: type=1400 audit(1742238458.973:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.045918 kernel: audit: type=1400 audit(1742238458.973:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.059725 kernel: audit: type=1400 audit(1742238458.973:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.086474 kernel: audit: type=1400 audit(1742238458.973:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.086725 kernel: audit: type=1400 audit(1742238458.973:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.100679 kernel: audit: type=1400 audit(1742238458.973:1305): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.116775 kernel: audit: type=1400 audit(1742238458.974:1306): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit: BPF prog-id=202 op=LOAD Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4117 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:38.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316164303938333335343638653665643261396534633834333432 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4117 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:38.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316164303938333335343638653665643261396534633834333432 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:38.974000 audit: BPF prog-id=203 op=LOAD Mar 17 19:07:38.974000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039e1f0 items=0 ppid=4117 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:38.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316164303938333335343638653665643261396534633834333432 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit: BPF prog-id=204 op=LOAD Mar 17 19:07:39.004000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039e238 items=0 ppid=4117 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:39.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316164303938333335343638653665643261396534633834333432 Mar 17 19:07:39.004000 audit: BPF prog-id=204 op=UNLOAD Mar 17 19:07:39.004000 audit: BPF prog-id=203 op=UNLOAD Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:39.004000 audit: BPF prog-id=205 op=LOAD Mar 17 19:07:39.004000 audit[4585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039e648 items=0 ppid=4117 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:39.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865316164303938333335343638653665643261396534633834333432 Mar 17 19:07:39.135038 env[1440]: time="2025-03-17T19:07:39.134969161Z" level=info msg="StartContainer for \"8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d\" returns successfully" Mar 17 19:07:39.639568 kubelet[2476]: I0317 19:07:39.639457 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7b8dfbdb96-cscjj" podStartSLOduration=31.983222803 podStartE2EDuration="37.639429547s" podCreationTimestamp="2025-03-17 19:07:02 +0000 UTC" firstStartedPulling="2025-03-17 19:07:33.203954634 +0000 UTC m=+47.037921211" lastFinishedPulling="2025-03-17 19:07:38.860161278 +0000 UTC m=+52.694127955" observedRunningTime="2025-03-17 19:07:39.596497902 +0000 UTC m=+53.430464479" watchObservedRunningTime="2025-03-17 19:07:39.639429547 +0000 UTC m=+53.473396124" Mar 17 19:07:40.616950 env[1440]: time="2025-03-17T19:07:40.616889398Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:40.626607 env[1440]: time="2025-03-17T19:07:40.626552352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:40.631816 env[1440]: time="2025-03-17T19:07:40.631774982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:40.635971 env[1440]: time="2025-03-17T19:07:40.635936405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:40.636357 env[1440]: time="2025-03-17T19:07:40.636324207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 19:07:40.640466 env[1440]: time="2025-03-17T19:07:40.640432131Z" level=info msg="CreateContainer within sandbox \"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 19:07:40.677442 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1066354955.mount: Deactivated successfully. Mar 17 19:07:40.698831 env[1440]: time="2025-03-17T19:07:40.698777461Z" level=info msg="CreateContainer within sandbox \"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fe943391679f905e02ffc300059c8b503affa44dd4c9f1623fdd3be68d555cd3\"" Mar 17 19:07:40.699532 env[1440]: time="2025-03-17T19:07:40.699491165Z" level=info msg="StartContainer for \"fe943391679f905e02ffc300059c8b503affa44dd4c9f1623fdd3be68d555cd3\"" Mar 17 19:07:40.732294 systemd[1]: Started cri-containerd-fe943391679f905e02ffc300059c8b503affa44dd4c9f1623fdd3be68d555cd3.scope. Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7fb0446562d8 items=0 ppid=4529 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:40.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393433333931363739663930356530326666633330303035396338 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit: BPF prog-id=206 op=LOAD Mar 17 19:07:40.748000 audit[4640]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c00033a8f8 items=0 ppid=4529 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:40.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393433333931363739663930356530326666633330303035396338 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit: BPF prog-id=207 op=LOAD Mar 17 19:07:40.748000 audit[4640]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c00033a948 items=0 ppid=4529 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:40.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393433333931363739663930356530326666633330303035396338 Mar 17 19:07:40.748000 audit: BPF prog-id=207 op=UNLOAD Mar 17 19:07:40.748000 audit: BPF prog-id=206 op=UNLOAD Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { perfmon } for pid=4640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit[4640]: AVC avc: denied { bpf } for pid=4640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:40.748000 audit: BPF prog-id=208 op=LOAD Mar 17 19:07:40.748000 audit[4640]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c00033a9d8 items=0 ppid=4529 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:40.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665393433333931363739663930356530326666633330303035396338 Mar 17 19:07:40.772288 env[1440]: time="2025-03-17T19:07:40.772230876Z" level=info msg="StartContainer for \"fe943391679f905e02ffc300059c8b503affa44dd4c9f1623fdd3be68d555cd3\" returns successfully" Mar 17 19:07:40.774518 env[1440]: time="2025-03-17T19:07:40.773484883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 19:07:40.871522 systemd[1]: run-containerd-runc-k8s.io-fe943391679f905e02ffc300059c8b503affa44dd4c9f1623fdd3be68d555cd3-runc.SMg27C.mount: Deactivated successfully. Mar 17 19:07:42.515000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:42.515000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:42.515000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00252df80 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:42.515000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a65120 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:42.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:42.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:42.767705 env[1440]: time="2025-03-17T19:07:42.767533187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:42.774074 env[1440]: time="2025-03-17T19:07:42.774027023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:42.779169 env[1440]: time="2025-03-17T19:07:42.779083050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:42.788090 env[1440]: time="2025-03-17T19:07:42.788051200Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 19:07:42.788581 env[1440]: time="2025-03-17T19:07:42.788541403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 19:07:42.793103 env[1440]: time="2025-03-17T19:07:42.793067628Z" level=info msg="CreateContainer within sandbox \"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 19:07:42.848390 env[1440]: time="2025-03-17T19:07:42.848098631Z" level=info msg="CreateContainer within sandbox \"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ee9aa86b1c3b1081b7a299d1137c7f0cc0ef81d2edba3d4ea4fe293aa3b16d52\"" Mar 17 19:07:42.851028 env[1440]: time="2025-03-17T19:07:42.849195937Z" level=info msg="StartContainer for \"ee9aa86b1c3b1081b7a299d1137c7f0cc0ef81d2edba3d4ea4fe293aa3b16d52\"" Mar 17 19:07:42.884840 systemd[1]: run-containerd-runc-k8s.io-ee9aa86b1c3b1081b7a299d1137c7f0cc0ef81d2edba3d4ea4fe293aa3b16d52-runc.uPbu5G.mount: Deactivated successfully. Mar 17 19:07:42.889982 systemd[1]: Started cri-containerd-ee9aa86b1c3b1081b7a299d1137c7f0cc0ef81d2edba3d4ea4fe293aa3b16d52.scope. Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c76b0 a2=3c a3=7f3374e8b628 items=0 ppid=4529 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565396161383662316333623130383162376132393964313133376337 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.903000 audit: BPF prog-id=209 op=LOAD Mar 17 19:07:42.903000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c79d8 a2=78 a3=c00037f518 items=0 ppid=4529 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565396161383662316333623130383162376132393964313133376337 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.904000 audit: BPF prog-id=210 op=LOAD Mar 17 19:07:42.904000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c7770 a2=78 a3=c00037f568 items=0 ppid=4529 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:42.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565396161383662316333623130383162376132393964313133376337 Mar 17 19:07:42.905000 audit: BPF prog-id=210 op=UNLOAD Mar 17 19:07:42.905000 audit: BPF prog-id=209 op=UNLOAD Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { perfmon } for pid=4682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit[4682]: AVC avc: denied { bpf } for pid=4682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 19:07:42.905000 audit: BPF prog-id=211 op=LOAD Mar 17 19:07:42.905000 audit[4682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c7c30 a2=78 a3=c00037f5f8 items=0 ppid=4529 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:07:42.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565396161383662316333623130383162376132393964313133376337 Mar 17 19:07:42.925612 env[1440]: time="2025-03-17T19:07:42.925537159Z" level=info msg="StartContainer for \"ee9aa86b1c3b1081b7a299d1137c7f0cc0ef81d2edba3d4ea4fe293aa3b16d52\" returns successfully" Mar 17 19:07:43.233000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.233000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.233000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0034d3d10 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.233000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c004df4dc0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.234000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.234000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c004953fb0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.254000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.254000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0034d3e30 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.254000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.255000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.255000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0051ccdc0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.255000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:43.255000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00b2140f0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:07:43.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:07:43.736485 kubelet[2476]: I0317 19:07:43.736435 2476 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 19:07:43.736485 kubelet[2476]: I0317 19:07:43.736499 2476 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 19:07:46.574793 env[1440]: time="2025-03-17T19:07:46.574745599Z" level=info msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.616 [WARNING][4729] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e", Pod:"coredns-6f6b679f8f-xxwnb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab395bda5f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.617 [INFO][4729] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.617 [INFO][4729] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" iface="eth0" netns="" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.617 [INFO][4729] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.617 [INFO][4729] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.636 [INFO][4736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.636 [INFO][4736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.636 [INFO][4736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.642 [WARNING][4736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.642 [INFO][4736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.644 [INFO][4736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:46.646085 env[1440]: 2025-03-17 19:07:46.645 [INFO][4729] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.646616 env[1440]: time="2025-03-17T19:07:46.646118676Z" level=info msg="TearDown network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" successfully" Mar 17 19:07:46.646616 env[1440]: time="2025-03-17T19:07:46.646157076Z" level=info msg="StopPodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" returns successfully" Mar 17 19:07:46.647390 env[1440]: time="2025-03-17T19:07:46.647348982Z" level=info msg="RemovePodSandbox for \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" Mar 17 19:07:46.647527 env[1440]: time="2025-03-17T19:07:46.647388782Z" level=info msg="Forcibly stopping sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\"" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.682 [WARNING][4755] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"db7ba6a4-40d0-466b-baaa-53e5a7ec7d58", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"56e7a5fd2345e5abde2933d7d396f28f6089f24f401d91f49048dd01cc90961e", Pod:"coredns-6f6b679f8f-xxwnb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab395bda5f8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.682 [INFO][4755] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.682 [INFO][4755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" iface="eth0" netns="" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.682 [INFO][4755] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.682 [INFO][4755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.703 [INFO][4761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.703 [INFO][4761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.703 [INFO][4761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.708 [WARNING][4761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.708 [INFO][4761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" HandleID="k8s-pod-network.3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--xxwnb-eth0" Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.710 [INFO][4761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:46.712193 env[1440]: 2025-03-17 19:07:46.711 [INFO][4755] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06" Mar 17 19:07:46.712912 env[1440]: time="2025-03-17T19:07:46.712232525Z" level=info msg="TearDown network for sandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" successfully" Mar 17 19:07:46.725985 env[1440]: time="2025-03-17T19:07:46.725935297Z" level=info msg="RemovePodSandbox \"3dfbcf8750185700b420d236cb0e4f261133c271bb0ff628a13640f5c9ae6b06\" returns successfully" Mar 17 19:07:46.726722 env[1440]: time="2025-03-17T19:07:46.726680601Z" level=info msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.777 [WARNING][4784] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b3231f1-f97b-4d72-915b-fa835f8b46d0", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee", Pod:"calico-apiserver-7bbb8745b8-l7fdg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali350a685ed58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.777 [INFO][4784] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.777 [INFO][4784] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" iface="eth0" netns="" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.777 [INFO][4784] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.777 [INFO][4784] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.798 [INFO][4790] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.798 [INFO][4790] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.798 [INFO][4790] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.804 [WARNING][4790] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.804 [INFO][4790] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.805 [INFO][4790] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:46.807504 env[1440]: 2025-03-17 19:07:46.806 [INFO][4784] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.808201 env[1440]: time="2025-03-17T19:07:46.807539028Z" level=info msg="TearDown network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" successfully" Mar 17 19:07:46.808201 env[1440]: time="2025-03-17T19:07:46.807581928Z" level=info msg="StopPodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" returns successfully" Mar 17 19:07:46.808510 env[1440]: time="2025-03-17T19:07:46.808475133Z" level=info msg="RemovePodSandbox for \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" Mar 17 19:07:46.808686 env[1440]: time="2025-03-17T19:07:46.808626934Z" level=info msg="Forcibly stopping sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\"" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.843 [WARNING][4808] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b3231f1-f97b-4d72-915b-fa835f8b46d0", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"130e0d52f645a6d73c040cb246cd60027a10a21e3f181781d61cb02c1a4412ee", Pod:"calico-apiserver-7bbb8745b8-l7fdg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali350a685ed58", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.843 [INFO][4808] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.843 [INFO][4808] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" iface="eth0" netns="" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.843 [INFO][4808] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.843 [INFO][4808] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.863 [INFO][4814] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.863 [INFO][4814] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.863 [INFO][4814] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.870 [WARNING][4814] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.870 [INFO][4814] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" HandleID="k8s-pod-network.4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--l7fdg-eth0" Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.872 [INFO][4814] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:46.876164 env[1440]: 2025-03-17 19:07:46.873 [INFO][4808] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6" Mar 17 19:07:46.876164 env[1440]: time="2025-03-17T19:07:46.874526282Z" level=info msg="TearDown network for sandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" successfully" Mar 17 19:07:46.886242 env[1440]: time="2025-03-17T19:07:46.886194543Z" level=info msg="RemovePodSandbox \"4c81303f5b154750b8350401c29f6adf4ff121e69d008c0b3a26866ba1091af6\" returns successfully" Mar 17 19:07:46.886886 env[1440]: time="2025-03-17T19:07:46.886854347Z" level=info msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.922 [WARNING][4832] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0", GenerateName:"calico-kube-controllers-7b8dfbdb96-", Namespace:"calico-system", SelfLink:"", UID:"c1441905-37cb-4b72-ac35-ecbf4670d6d7", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b8dfbdb96", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b", Pod:"calico-kube-controllers-7b8dfbdb96-cscjj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8bbabeac5b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.922 [INFO][4832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.922 [INFO][4832] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" iface="eth0" netns="" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.922 [INFO][4832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.922 [INFO][4832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.942 [INFO][4839] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.942 [INFO][4839] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.942 [INFO][4839] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.948 [WARNING][4839] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.948 [INFO][4839] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.950 [INFO][4839] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:46.952283 env[1440]: 2025-03-17 19:07:46.951 [INFO][4832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:46.952918 env[1440]: time="2025-03-17T19:07:46.952873496Z" level=info msg="TearDown network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" successfully" Mar 17 19:07:46.953035 env[1440]: time="2025-03-17T19:07:46.953019296Z" level=info msg="StopPodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" returns successfully" Mar 17 19:07:46.953602 env[1440]: time="2025-03-17T19:07:46.953565699Z" level=info msg="RemovePodSandbox for \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" Mar 17 19:07:46.953752 env[1440]: time="2025-03-17T19:07:46.953614199Z" level=info msg="Forcibly stopping sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\"" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:46.988 [WARNING][4857] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0", GenerateName:"calico-kube-controllers-7b8dfbdb96-", Namespace:"calico-system", SelfLink:"", UID:"c1441905-37cb-4b72-ac35-ecbf4670d6d7", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7b8dfbdb96", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"d7ae4ef0287f3d3e82a27ea5acacd29a109627203f99be8a252318cb6f41d40b", Pod:"calico-kube-controllers-7b8dfbdb96-cscjj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8bbabeac5b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:46.988 [INFO][4857] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:46.988 [INFO][4857] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" iface="eth0" netns="" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:46.988 [INFO][4857] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:46.988 [INFO][4857] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.008 [INFO][4863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.009 [INFO][4863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.009 [INFO][4863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.014 [WARNING][4863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.014 [INFO][4863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" HandleID="k8s-pod-network.38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--kube--controllers--7b8dfbdb96--cscjj-eth0" Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.015 [INFO][4863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.017645 env[1440]: 2025-03-17 19:07:47.016 [INFO][4857] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744" Mar 17 19:07:47.018366 env[1440]: time="2025-03-17T19:07:47.017895038Z" level=info msg="TearDown network for sandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" successfully" Mar 17 19:07:47.027776 env[1440]: time="2025-03-17T19:07:47.027720589Z" level=info msg="RemovePodSandbox \"38cb29c8cb1fc1bfccdfd35a98e3817015035c64eae3a0fdb6d62c41ce8a0744\" returns successfully" Mar 17 19:07:47.028446 env[1440]: time="2025-03-17T19:07:47.028409293Z" level=info msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.073 [WARNING][4882] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bdab152a-52ca-410d-bbdc-a0b9b3d6c800", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887", Pod:"coredns-6f6b679f8f-qb7c6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali169b1de4852", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.074 [INFO][4882] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.074 [INFO][4882] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" iface="eth0" netns="" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.074 [INFO][4882] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.074 [INFO][4882] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.094 [INFO][4888] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.094 [INFO][4888] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.094 [INFO][4888] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.102 [WARNING][4888] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.102 [INFO][4888] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.104 [INFO][4888] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.106400 env[1440]: 2025-03-17 19:07:47.105 [INFO][4882] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.107091 env[1440]: time="2025-03-17T19:07:47.106446501Z" level=info msg="TearDown network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" successfully" Mar 17 19:07:47.107091 env[1440]: time="2025-03-17T19:07:47.106485001Z" level=info msg="StopPodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" returns successfully" Mar 17 19:07:47.107206 env[1440]: time="2025-03-17T19:07:47.107172205Z" level=info msg="RemovePodSandbox for \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" Mar 17 19:07:47.107259 env[1440]: time="2025-03-17T19:07:47.107213105Z" level=info msg="Forcibly stopping sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\"" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.143 [WARNING][4907] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"bdab152a-52ca-410d-bbdc-a0b9b3d6c800", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 6, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"a6edc78a88983168f9398912d0fdc387c5acadf6bb708a940de2c8315b0f3887", Pod:"coredns-6f6b679f8f-qb7c6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali169b1de4852", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.144 [INFO][4907] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.144 [INFO][4907] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" iface="eth0" netns="" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.144 [INFO][4907] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.144 [INFO][4907] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.162 [INFO][4913] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.162 [INFO][4913] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.162 [INFO][4913] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.169 [WARNING][4913] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.169 [INFO][4913] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" HandleID="k8s-pod-network.0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-coredns--6f6b679f8f--qb7c6-eth0" Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.171 [INFO][4913] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.175489 env[1440]: 2025-03-17 19:07:47.172 [INFO][4907] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08" Mar 17 19:07:47.175489 env[1440]: time="2025-03-17T19:07:47.173439051Z" level=info msg="TearDown network for sandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" successfully" Mar 17 19:07:47.184200 env[1440]: time="2025-03-17T19:07:47.184151507Z" level=info msg="RemovePodSandbox \"0232e29f3ccf4b4b12471e3402e4b6cb3029333572c67eab9c61092cb4fb0c08\" returns successfully" Mar 17 19:07:47.184919 env[1440]: time="2025-03-17T19:07:47.184886111Z" level=info msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.222 [WARNING][4932] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"305fb96c-f6b0-4e24-9c8d-d76d5088c95d", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01", Pod:"csi-node-driver-r26l7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e489facaae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.222 [INFO][4932] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.222 [INFO][4932] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" iface="eth0" netns="" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.222 [INFO][4932] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.222 [INFO][4932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.242 [INFO][4938] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.243 [INFO][4938] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.243 [INFO][4938] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.248 [WARNING][4938] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.248 [INFO][4938] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.249 [INFO][4938] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.251826 env[1440]: 2025-03-17 19:07:47.250 [INFO][4932] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.252520 env[1440]: time="2025-03-17T19:07:47.251860261Z" level=info msg="TearDown network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" successfully" Mar 17 19:07:47.252520 env[1440]: time="2025-03-17T19:07:47.251916061Z" level=info msg="StopPodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" returns successfully" Mar 17 19:07:47.252619 env[1440]: time="2025-03-17T19:07:47.252587364Z" level=info msg="RemovePodSandbox for \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" Mar 17 19:07:47.252701 env[1440]: time="2025-03-17T19:07:47.252635965Z" level=info msg="Forcibly stopping sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\"" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.287 [WARNING][4956] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"305fb96c-f6b0-4e24-9c8d-d76d5088c95d", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"3154d39aad4e123b997adc212a53355f383abbffa7ef9b792d21832720a01a01", Pod:"csi-node-driver-r26l7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5e489facaae", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.287 [INFO][4956] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.287 [INFO][4956] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" iface="eth0" netns="" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.287 [INFO][4956] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.287 [INFO][4956] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.309 [INFO][4962] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.309 [INFO][4962] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.310 [INFO][4962] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.316 [WARNING][4962] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.316 [INFO][4962] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" HandleID="k8s-pod-network.bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-csi--node--driver--r26l7-eth0" Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.318 [INFO][4962] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.320673 env[1440]: 2025-03-17 19:07:47.319 [INFO][4956] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d" Mar 17 19:07:47.321369 env[1440]: time="2025-03-17T19:07:47.320709920Z" level=info msg="TearDown network for sandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" successfully" Mar 17 19:07:47.356312 env[1440]: time="2025-03-17T19:07:47.356257506Z" level=info msg="RemovePodSandbox \"bcf3fb7682bbd4d6d4fce6b412c73d922360abfdcfd345c3c961cc2c61953c0d\" returns successfully" Mar 17 19:07:47.357080 env[1440]: time="2025-03-17T19:07:47.357039710Z" level=info msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.390 [WARNING][4980] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"68d0588d-642d-4254-b2a5-0d2f1345db5c", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9", Pod:"calico-apiserver-7bbb8745b8-4qk7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf6a68a922f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.391 [INFO][4980] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.391 [INFO][4980] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" iface="eth0" netns="" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.391 [INFO][4980] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.391 [INFO][4980] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.410 [INFO][4986] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.410 [INFO][4986] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.410 [INFO][4986] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.417 [WARNING][4986] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.417 [INFO][4986] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.418 [INFO][4986] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.420891 env[1440]: 2025-03-17 19:07:47.419 [INFO][4980] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.421552 env[1440]: time="2025-03-17T19:07:47.420916044Z" level=info msg="TearDown network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" successfully" Mar 17 19:07:47.421552 env[1440]: time="2025-03-17T19:07:47.420958044Z" level=info msg="StopPodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" returns successfully" Mar 17 19:07:47.421929 env[1440]: time="2025-03-17T19:07:47.421886549Z" level=info msg="RemovePodSandbox for \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" Mar 17 19:07:47.422069 env[1440]: time="2025-03-17T19:07:47.421936249Z" level=info msg="Forcibly stopping sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\"" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.455 [WARNING][5005] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0", GenerateName:"calico-apiserver-7bbb8745b8-", Namespace:"calico-apiserver", SelfLink:"", UID:"68d0588d-642d-4254-b2a5-0d2f1345db5c", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 19, 7, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bbb8745b8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-a-9eb0e2b4dd", ContainerID:"2dd44df38177e2cf539a02258e663fdad78d46f8a2d1fcd5f2282eba1b2d1dc9", Pod:"calico-apiserver-7bbb8745b8-4qk7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibf6a68a922f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.455 [INFO][5005] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.455 [INFO][5005] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" iface="eth0" netns="" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.455 [INFO][5005] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.455 [INFO][5005] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.475 [INFO][5011] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.475 [INFO][5011] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.476 [INFO][5011] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.483 [WARNING][5011] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.483 [INFO][5011] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" HandleID="k8s-pod-network.849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Workload="ci--3510.3.7--a--9eb0e2b4dd-k8s-calico--apiserver--7bbb8745b8--4qk7z-eth0" Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.484 [INFO][5011] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 19:07:47.487197 env[1440]: 2025-03-17 19:07:47.485 [INFO][5005] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1" Mar 17 19:07:47.489464 env[1440]: time="2025-03-17T19:07:47.487171190Z" level=info msg="TearDown network for sandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" successfully" Mar 17 19:07:47.497834 env[1440]: time="2025-03-17T19:07:47.497788246Z" level=info msg="RemovePodSandbox \"849c04b8ee6745ba618b25a10f881224e50d9f8d5eac8a8759a9519801e532c1\" returns successfully" Mar 17 19:07:47.865360 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.Roe81l.mount: Deactivated successfully. Mar 17 19:07:49.169000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.174663 kernel: kauditd_printk_skb: 157 callbacks suppressed Mar 17 19:07:49.174823 kernel: audit: type=1400 audit(1742238469.169:1335): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.169000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.206384 kernel: audit: type=1400 audit(1742238469.169:1336): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.206552 kernel: audit: type=1300 audit(1742238469.169:1336): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025d60c0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025d60c0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.169000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.260012 kernel: audit: type=1327 audit(1742238469.169:1336): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.260165 kernel: audit: type=1400 audit(1742238469.169:1337): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.260218 kernel: audit: type=1300 audit(1742238469.169:1337): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025d6460 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025d6460 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.297703 kernel: audit: type=1327 audit(1742238469.169:1337): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.297845 kernel: audit: type=1300 audit(1742238469.169:1335): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023146a0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023146a0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.335286 kernel: audit: type=1327 audit(1742238469.169:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:49.335433 kernel: audit: type=1400 audit(1742238469.170:1338): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.170000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:07:49.170000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025d6740 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:07:49.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:07:54.122699 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.l4znRR.mount: Deactivated successfully. Mar 17 19:07:54.191685 kubelet[2476]: I0317 19:07:54.191573 2476 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-r26l7" podStartSLOduration=45.381634241 podStartE2EDuration="52.191546988s" podCreationTimestamp="2025-03-17 19:07:02 +0000 UTC" firstStartedPulling="2025-03-17 19:07:35.980481866 +0000 UTC m=+49.814448443" lastFinishedPulling="2025-03-17 19:07:42.790394613 +0000 UTC m=+56.624361190" observedRunningTime="2025-03-17 19:07:43.608963694 +0000 UTC m=+57.442930371" watchObservedRunningTime="2025-03-17 19:07:54.191546988 +0000 UTC m=+68.025513565" Mar 17 19:08:02.273694 kubelet[2476]: I0317 19:08:02.273622 2476 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 19:08:02.323000 audit[5072]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:08:02.329468 kernel: kauditd_printk_skb: 2 callbacks suppressed Mar 17 19:08:02.329612 kernel: audit: type=1325 audit(1742238482.323:1339): table=filter:119 family=2 entries=8 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:08:02.323000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdf7b5fc30 a2=0 a3=7ffdf7b5fc1c items=0 ppid=2581 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:08:02.359124 kernel: audit: type=1300 audit(1742238482.323:1339): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdf7b5fc30 a2=0 a3=7ffdf7b5fc1c items=0 ppid=2581 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:08:02.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:08:02.358000 audit[5072]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:08:02.380676 kernel: audit: type=1327 audit(1742238482.323:1339): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:08:02.380830 kernel: audit: type=1325 audit(1742238482.358:1340): table=nat:120 family=2 entries=34 op=nft_register_chain pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:08:02.358000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdf7b5fc30 a2=0 a3=7ffdf7b5fc1c items=0 ppid=2581 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:08:02.400387 kernel: audit: type=1300 audit(1742238482.358:1340): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdf7b5fc30 a2=0 a3=7ffdf7b5fc1c items=0 ppid=2581 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:08:02.400550 kernel: audit: type=1327 audit(1742238482.358:1340): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:08:02.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:08:17.870517 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.S9xfdo.mount: Deactivated successfully. Mar 17 19:08:24.124076 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.ckBsDq.mount: Deactivated successfully. Mar 17 19:08:28.068496 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.XfwkSI.mount: Deactivated successfully. Mar 17 19:08:36.766000 audit[4366]: AVC avc: denied { watch } for pid=4366 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.2215373127/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c833,c943 tclass=file permissive=0 Mar 17 19:08:36.795323 kernel: audit: type=1400 audit(1742238516.766:1341): avc: denied { watch } for pid=4366 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.2215373127/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c833,c943 tclass=file permissive=0 Mar 17 19:08:36.795471 kernel: audit: type=1300 audit(1742238516.766:1341): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a185a0 a2=fc6 a3=0 items=0 ppid=3800 pid=4366 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 key=(null) Mar 17 19:08:36.766000 audit[4366]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a185a0 a2=fc6 a3=0 items=0 ppid=3800 pid=4366 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 key=(null) Mar 17 19:08:36.766000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:08:36.824645 kernel: audit: type=1327 audit(1742238516.766:1341): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:08:37.041000 audit[4479]: AVC avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:08:37.041000 audit[4479]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149cde0 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:08:37.082395 kernel: audit: type=1400 audit(1742238517.041:1342): avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:08:37.082573 kernel: audit: type=1300 audit(1742238517.041:1342): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149cde0 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:08:37.082603 kernel: audit: type=1327 audit(1742238517.041:1342): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:08:37.041000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:08:42.517000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:42.517000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:42.551127 kernel: audit: type=1400 audit(1742238522.517:1343): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:42.551292 kernel: audit: type=1400 audit(1742238522.517:1344): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:42.551320 kernel: audit: type=1300 audit(1742238522.517:1344): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b0a80 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:42.517000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009b0a80 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:42.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:42.589081 kernel: audit: type=1327 audit(1742238522.517:1344): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:42.589816 kernel: audit: type=1300 audit(1742238522.517:1343): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a18360 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:42.517000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a18360 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:42.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:42.627927 kernel: audit: type=1327 audit(1742238522.517:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:43.235000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.235000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.268469 kernel: audit: type=1400 audit(1742238523.235:1345): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.268639 kernel: audit: type=1400 audit(1742238523.235:1346): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.235000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f8b7a00 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.306157 kernel: audit: type=1300 audit(1742238523.235:1345): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00f8b7a00 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.306309 kernel: audit: type=1327 audit(1742238523.235:1345): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.235000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.235000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007347950 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.235000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00707d680 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.256000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.256000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c007347bc0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.256000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.256000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006272b80 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:43.256000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:43.256000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00707d830 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:08:43.256000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:08:47.864798 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.JnjtlA.mount: Deactivated successfully. Mar 17 19:08:49.170000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.175889 kernel: kauditd_printk_skb: 14 callbacks suppressed Mar 17 19:08:49.176025 kernel: audit: type=1400 audit(1742238529.170:1351): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.170000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.207128 kernel: audit: type=1400 audit(1742238529.170:1352): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.207292 kernel: audit: type=1300 audit(1742238529.170:1352): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a19c60 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.170000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a19c60 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.245510 kernel: audit: type=1327 audit(1742238529.170:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.245681 kernel: audit: type=1400 audit(1742238529.170:1353): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.170000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.170000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a19c80 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.281420 kernel: audit: type=1300 audit(1742238529.170:1353): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a19c80 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.281567 kernel: audit: type=1327 audit(1742238529.170:1353): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.170000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.170000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b48240 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.333976 kernel: audit: type=1400 audit(1742238529.170:1354): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:08:49.334147 kernel: audit: type=1300 audit(1742238529.170:1354): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b48240 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.334176 kernel: audit: type=1327 audit(1742238529.170:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:49.170000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002961ee0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:08:49.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:08:54.127811 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.AI6cZQ.mount: Deactivated successfully. Mar 17 19:09:17.863925 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.jJYOhz.mount: Deactivated successfully. Mar 17 19:09:24.122260 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.qw2Utm.mount: Deactivated successfully. Mar 17 19:09:25.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.16:22-10.200.16.10:53350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:25.758937 systemd[1]: Started sshd@7-10.200.8.16:22-10.200.16.10:53350.service. Mar 17 19:09:25.764345 kernel: kauditd_printk_skb: 2 callbacks suppressed Mar 17 19:09:25.764469 kernel: audit: type=1130 audit(1742238565.758:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.16:22-10.200.16.10:53350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:26.391000 audit[5264]: USER_ACCT pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.394293 sshd[5264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:26.411569 sshd[5264]: Accepted publickey for core from 10.200.16.10 port 53350 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:26.411849 kernel: audit: type=1101 audit(1742238566.391:1356): pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.418891 systemd-logind[1424]: New session 10 of user core. Mar 17 19:09:26.422843 systemd[1]: Started session-10.scope. Mar 17 19:09:26.393000 audit[5264]: CRED_ACQ pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.445912 kernel: audit: type=1103 audit(1742238566.393:1357): pid=5264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.467053 kernel: audit: type=1006 audit(1742238566.393:1358): pid=5264 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Mar 17 19:09:26.393000 audit[5264]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60300750 a2=3 a3=0 items=0 ppid=1 pid=5264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:26.488729 kernel: audit: type=1300 audit(1742238566.393:1358): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60300750 a2=3 a3=0 items=0 ppid=1 pid=5264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:26.500690 kernel: audit: type=1327 audit(1742238566.393:1358): proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:26.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:26.428000 audit[5264]: USER_START pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.541289 kernel: audit: type=1105 audit(1742238566.428:1359): pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.541479 kernel: audit: type=1103 audit(1742238566.430:1360): pid=5266 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.430000 audit[5266]: CRED_ACQ pid=5266 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.912848 sshd[5264]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:26.913000 audit[5264]: USER_END pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.916831 systemd-logind[1424]: Session 10 logged out. Waiting for processes to exit. Mar 17 19:09:26.918311 systemd[1]: sshd@7-10.200.8.16:22-10.200.16.10:53350.service: Deactivated successfully. Mar 17 19:09:26.919295 systemd[1]: session-10.scope: Deactivated successfully. Mar 17 19:09:26.921135 systemd-logind[1424]: Removed session 10. Mar 17 19:09:26.913000 audit[5264]: CRED_DISP pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.950621 kernel: audit: type=1106 audit(1742238566.913:1361): pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.950819 kernel: audit: type=1104 audit(1742238566.913:1362): pid=5264 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:26.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.16:22-10.200.16.10:53350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:28.042856 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.oZWr1c.mount: Deactivated successfully. Mar 17 19:09:32.019687 systemd[1]: Started sshd@8-10.200.8.16:22-10.200.16.10:45056.service. Mar 17 19:09:32.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.16:22-10.200.16.10:45056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:32.025709 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 19:09:32.025817 kernel: audit: type=1130 audit(1742238572.019:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.16:22-10.200.16.10:45056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:32.654000 audit[5296]: USER_ACCT pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.674328 sshd[5296]: Accepted publickey for core from 10.200.16.10 port 45056 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:32.674801 kernel: audit: type=1101 audit(1742238572.654:1365): pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.674846 sshd[5296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:32.673000 audit[5296]: CRED_ACQ pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.680499 systemd[1]: Started session-11.scope. Mar 17 19:09:32.681804 systemd-logind[1424]: New session 11 of user core. Mar 17 19:09:32.692714 kernel: audit: type=1103 audit(1742238572.673:1366): pid=5296 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.673000 audit[5296]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f48160 a2=3 a3=0 items=0 ppid=1 pid=5296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:32.703679 kernel: audit: type=1006 audit(1742238572.673:1367): pid=5296 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Mar 17 19:09:32.703735 kernel: audit: type=1300 audit(1742238572.673:1367): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f48160 a2=3 a3=0 items=0 ppid=1 pid=5296 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:32.721044 kernel: audit: type=1327 audit(1742238572.673:1367): proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:32.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:32.684000 audit[5296]: USER_START pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.744147 kernel: audit: type=1105 audit(1742238572.684:1368): pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.684000 audit[5298]: CRED_ACQ pid=5298 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:32.760012 kernel: audit: type=1103 audit(1742238572.684:1369): pid=5298 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:33.161325 sshd[5296]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:33.162000 audit[5296]: USER_END pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:33.164765 systemd-logind[1424]: Session 11 logged out. Waiting for processes to exit. Mar 17 19:09:33.166164 systemd[1]: sshd@8-10.200.8.16:22-10.200.16.10:45056.service: Deactivated successfully. Mar 17 19:09:33.167035 systemd[1]: session-11.scope: Deactivated successfully. Mar 17 19:09:33.168452 systemd-logind[1424]: Removed session 11. Mar 17 19:09:33.162000 audit[5296]: CRED_DISP pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:33.197516 kernel: audit: type=1106 audit(1742238573.162:1370): pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:33.197771 kernel: audit: type=1104 audit(1742238573.162:1371): pid=5296 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:33.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.16:22-10.200.16.10:45056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:36.770000 audit[4366]: AVC avc: denied { watch } for pid=4366 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.2215373127/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c833,c943 tclass=file permissive=0 Mar 17 19:09:36.770000 audit[4366]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a18f00 a2=fc6 a3=0 items=0 ppid=3800 pid=4366 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 key=(null) Mar 17 19:09:36.770000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:09:37.041000 audit[4479]: AVC avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:09:37.047004 kernel: kauditd_printk_skb: 4 callbacks suppressed Mar 17 19:09:37.047131 kernel: audit: type=1400 audit(1742238577.041:1374): avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:09:37.041000 audit[4479]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149d4a0 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:09:37.089049 kernel: audit: type=1300 audit(1742238577.041:1374): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00149d4a0 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:09:37.089239 kernel: audit: type=1327 audit(1742238577.041:1374): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:09:37.041000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:09:38.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.16:22-10.200.16.10:45072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:38.267431 systemd[1]: Started sshd@9-10.200.8.16:22-10.200.16.10:45072.service. Mar 17 19:09:38.286704 kernel: audit: type=1130 audit(1742238578.266:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.16:22-10.200.16.10:45072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:38.897000 audit[5308]: USER_ACCT pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.918092 sshd[5308]: Accepted publickey for core from 10.200.16.10 port 45072 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:38.916000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.924522 systemd[1]: Started session-12.scope. Mar 17 19:09:38.918605 sshd[5308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:38.925528 systemd-logind[1424]: New session 12 of user core. Mar 17 19:09:38.936372 kernel: audit: type=1101 audit(1742238578.897:1376): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.936501 kernel: audit: type=1103 audit(1742238578.916:1377): pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.936529 kernel: audit: type=1006 audit(1742238578.916:1378): pid=5308 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Mar 17 19:09:38.916000 audit[5308]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9062d380 a2=3 a3=0 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:38.962937 kernel: audit: type=1300 audit(1742238578.916:1378): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9062d380 a2=3 a3=0 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:38.963172 kernel: audit: type=1327 audit(1742238578.916:1378): proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:38.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:38.931000 audit[5308]: USER_START pid=5308 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.987360 kernel: audit: type=1105 audit(1742238578.931:1379): pid=5308 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:38.933000 audit[5310]: CRED_ACQ pid=5310 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:39.418814 sshd[5308]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:39.418000 audit[5308]: USER_END pid=5308 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:39.419000 audit[5308]: CRED_DISP pid=5308 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:39.422515 systemd[1]: sshd@9-10.200.8.16:22-10.200.16.10:45072.service: Deactivated successfully. Mar 17 19:09:39.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.16:22-10.200.16.10:45072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:39.423729 systemd[1]: session-12.scope: Deactivated successfully. Mar 17 19:09:39.424664 systemd-logind[1424]: Session 12 logged out. Waiting for processes to exit. Mar 17 19:09:39.425632 systemd-logind[1424]: Removed session 12. Mar 17 19:09:42.517000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:42.523135 kernel: kauditd_printk_skb: 4 callbacks suppressed Mar 17 19:09:42.523255 kernel: audit: type=1400 audit(1742238582.517:1384): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:42.517000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:42.554851 kernel: audit: type=1400 audit(1742238582.517:1385): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:42.555011 kernel: audit: type=1300 audit(1742238582.517:1385): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001635b60 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:42.517000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001635b60 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:42.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:42.575974 kernel: audit: type=1327 audit(1742238582.517:1385): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:42.517000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f1aa20 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:42.612871 kernel: audit: type=1300 audit(1742238582.517:1384): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f1aa20 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:42.614051 kernel: audit: type=1327 audit(1742238582.517:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:42.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:43.236000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.255152 kernel: audit: type=1400 audit(1742238583.236:1387): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.255309 kernel: audit: type=1400 audit(1742238583.236:1386): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.236000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.236000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b560ba0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.289200 kernel: audit: type=1300 audit(1742238583.236:1386): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00b560ba0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.289392 kernel: audit: type=1327 audit(1742238583.236:1386): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.236000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.236000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0046f9410 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.236000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c005450390 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.269000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.269000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0054503c0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.269000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.269000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c004329f80 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:43.269000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:43.269000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c005450540 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:09:43.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:09:44.525277 systemd[1]: Started sshd@10-10.200.8.16:22-10.200.16.10:39384.service. Mar 17 19:09:44.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.16:22-10.200.16.10:39384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:45.153000 audit[5322]: USER_ACCT pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.155671 sshd[5322]: Accepted publickey for core from 10.200.16.10 port 39384 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:45.155000 audit[5322]: CRED_ACQ pid=5322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.155000 audit[5322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0aaab9b0 a2=3 a3=0 items=0 ppid=1 pid=5322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:45.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:45.157890 sshd[5322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:45.163417 systemd[1]: Started session-13.scope. Mar 17 19:09:45.164432 systemd-logind[1424]: New session 13 of user core. Mar 17 19:09:45.167000 audit[5322]: USER_START pid=5322 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.169000 audit[5324]: CRED_ACQ pid=5324 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.661159 sshd[5322]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:45.661000 audit[5322]: USER_END pid=5322 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.661000 audit[5322]: CRED_DISP pid=5322 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:45.665058 systemd[1]: sshd@10-10.200.8.16:22-10.200.16.10:39384.service: Deactivated successfully. Mar 17 19:09:45.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.16:22-10.200.16.10:39384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:45.666395 systemd[1]: session-13.scope: Deactivated successfully. Mar 17 19:09:45.667392 systemd-logind[1424]: Session 13 logged out. Waiting for processes to exit. Mar 17 19:09:45.668570 systemd-logind[1424]: Removed session 13. Mar 17 19:09:45.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.16:22-10.200.16.10:39400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:45.768037 systemd[1]: Started sshd@11-10.200.8.16:22-10.200.16.10:39400.service. Mar 17 19:09:46.395000 audit[5335]: USER_ACCT pid=5335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.397759 sshd[5335]: Accepted publickey for core from 10.200.16.10 port 39400 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:46.397000 audit[5335]: CRED_ACQ pid=5335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.397000 audit[5335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3607200 a2=3 a3=0 items=0 ppid=1 pid=5335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:46.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:46.399481 sshd[5335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:46.405014 systemd[1]: Started session-14.scope. Mar 17 19:09:46.405537 systemd-logind[1424]: New session 14 of user core. Mar 17 19:09:46.408000 audit[5335]: USER_START pid=5335 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.410000 audit[5339]: CRED_ACQ pid=5339 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.940214 sshd[5335]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:46.941000 audit[5335]: USER_END pid=5335 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.941000 audit[5335]: CRED_DISP pid=5335 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:46.944944 systemd[1]: sshd@11-10.200.8.16:22-10.200.16.10:39400.service: Deactivated successfully. Mar 17 19:09:46.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.16:22-10.200.16.10:39400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:46.946143 systemd[1]: session-14.scope: Deactivated successfully. Mar 17 19:09:46.947106 systemd-logind[1424]: Session 14 logged out. Waiting for processes to exit. Mar 17 19:09:46.948214 systemd-logind[1424]: Removed session 14. Mar 17 19:09:47.046149 systemd[1]: Started sshd@12-10.200.8.16:22-10.200.16.10:39408.service. Mar 17 19:09:47.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.16:22-10.200.16.10:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:47.683705 kernel: kauditd_printk_skb: 37 callbacks suppressed Mar 17 19:09:47.683860 kernel: audit: type=1101 audit(1742238587.674:1411): pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.674000 audit[5346]: USER_ACCT pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.678337 sshd[5346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:47.684227 sshd[5346]: Accepted publickey for core from 10.200.16.10 port 39408 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:47.690740 systemd[1]: Started session-15.scope. Mar 17 19:09:47.691750 systemd-logind[1424]: New session 15 of user core. Mar 17 19:09:47.674000 audit[5346]: CRED_ACQ pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.717377 kernel: audit: type=1103 audit(1742238587.674:1412): pid=5346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.717565 kernel: audit: type=1006 audit(1742238587.674:1413): pid=5346 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Mar 17 19:09:47.729685 kernel: audit: type=1300 audit(1742238587.674:1413): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc24f4eb0 a2=3 a3=0 items=0 ppid=1 pid=5346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:47.674000 audit[5346]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc24f4eb0 a2=3 a3=0 items=0 ppid=1 pid=5346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:47.745864 kernel: audit: type=1327 audit(1742238587.674:1413): proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:47.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:47.695000 audit[5346]: USER_START pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.770554 kernel: audit: type=1105 audit(1742238587.695:1414): pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.770749 kernel: audit: type=1103 audit(1742238587.700:1415): pid=5348 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.700000 audit[5348]: CRED_ACQ pid=5348 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:47.864992 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.Jyk087.mount: Deactivated successfully. Mar 17 19:09:48.187573 sshd[5346]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:48.188000 audit[5346]: USER_END pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:48.191906 systemd[1]: sshd@12-10.200.8.16:22-10.200.16.10:39408.service: Deactivated successfully. Mar 17 19:09:48.192925 systemd[1]: session-15.scope: Deactivated successfully. Mar 17 19:09:48.194966 systemd-logind[1424]: Session 15 logged out. Waiting for processes to exit. Mar 17 19:09:48.196228 systemd-logind[1424]: Removed session 15. Mar 17 19:09:48.211437 kernel: audit: type=1106 audit(1742238588.188:1416): pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:48.211575 kernel: audit: type=1104 audit(1742238588.188:1417): pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:48.188000 audit[5346]: CRED_DISP pid=5346 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:48.226388 kernel: audit: type=1131 audit(1742238588.190:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.16:22-10.200.16.10:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:48.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.16:22-10.200.16.10:39408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:49.172000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:49.172000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:49.172000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030ec220 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:49.172000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:49.172000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003044960 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:49.172000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:49.172000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:49.172000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003044b00 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:49.172000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:49.172000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:09:49.172000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030ec240 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:09:49.172000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:09:53.294109 systemd[1]: Started sshd@13-10.200.8.16:22-10.200.16.10:39118.service. Mar 17 19:09:53.316102 kernel: kauditd_printk_skb: 12 callbacks suppressed Mar 17 19:09:53.316261 kernel: audit: type=1130 audit(1742238593.293:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.16:22-10.200.16.10:39118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:53.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.16:22-10.200.16.10:39118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:53.922000 audit[5382]: USER_ACCT pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:53.924790 sshd[5382]: Accepted publickey for core from 10.200.16.10 port 39118 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:09:53.941000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:53.944002 sshd[5382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:09:53.950663 systemd[1]: Started session-16.scope. Mar 17 19:09:53.951774 systemd-logind[1424]: New session 16 of user core. Mar 17 19:09:53.960193 kernel: audit: type=1101 audit(1742238593.922:1424): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:53.960321 kernel: audit: type=1103 audit(1742238593.941:1425): pid=5382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:53.941000 audit[5382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeef1f5ad0 a2=3 a3=0 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:53.987561 kernel: audit: type=1006 audit(1742238593.941:1426): pid=5382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Mar 17 19:09:53.987921 kernel: audit: type=1300 audit(1742238593.941:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeef1f5ad0 a2=3 a3=0 items=0 ppid=1 pid=5382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:09:53.987971 kernel: audit: type=1327 audit(1742238593.941:1426): proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:53.941000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:09:53.956000 audit[5382]: USER_START pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.011422 kernel: audit: type=1105 audit(1742238593.956:1427): pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.011574 kernel: audit: type=1103 audit(1742238593.960:1428): pid=5384 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:53.960000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.453218 sshd[5382]: pam_unix(sshd:session): session closed for user core Mar 17 19:09:54.453000 audit[5382]: USER_END pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.457335 systemd[1]: sshd@13-10.200.8.16:22-10.200.16.10:39118.service: Deactivated successfully. Mar 17 19:09:54.458260 systemd[1]: session-16.scope: Deactivated successfully. Mar 17 19:09:54.459643 systemd-logind[1424]: Session 16 logged out. Waiting for processes to exit. Mar 17 19:09:54.460605 systemd-logind[1424]: Removed session 16. Mar 17 19:09:54.453000 audit[5382]: CRED_DISP pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.488735 kernel: audit: type=1106 audit(1742238594.453:1429): pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.488884 kernel: audit: type=1104 audit(1742238594.453:1430): pid=5382 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:09:54.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.16:22-10.200.16.10:39118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:59.560720 systemd[1]: Started sshd@14-10.200.8.16:22-10.200.16.10:45766.service. Mar 17 19:09:59.582630 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 19:09:59.582849 kernel: audit: type=1130 audit(1742238599.559:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.16:22-10.200.16.10:45766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:09:59.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.16:22-10.200.16.10:45766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:00.189000 audit[5416]: USER_ACCT pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.209897 kernel: audit: type=1101 audit(1742238600.189:1433): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.193066 sshd[5416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:00.210356 sshd[5416]: Accepted publickey for core from 10.200.16.10 port 45766 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:00.190000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.215256 systemd[1]: Started session-17.scope. Mar 17 19:10:00.216306 systemd-logind[1424]: New session 17 of user core. Mar 17 19:10:00.229677 kernel: audit: type=1103 audit(1742238600.190:1434): pid=5416 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.229799 kernel: audit: type=1006 audit(1742238600.191:1435): pid=5416 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Mar 17 19:10:00.238699 kernel: audit: type=1300 audit(1742238600.191:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3bd6a1c0 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:00.191000 audit[5416]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3bd6a1c0 a2=3 a3=0 items=0 ppid=1 pid=5416 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:00.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:00.261993 kernel: audit: type=1327 audit(1742238600.191:1435): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:00.223000 audit[5416]: USER_START pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.279761 kernel: audit: type=1105 audit(1742238600.223:1436): pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.225000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.280773 kernel: audit: type=1103 audit(1742238600.225:1437): pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.700136 sshd[5416]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:00.700000 audit[5416]: USER_END pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.704368 systemd[1]: sshd@14-10.200.8.16:22-10.200.16.10:45766.service: Deactivated successfully. Mar 17 19:10:00.705387 systemd[1]: session-17.scope: Deactivated successfully. Mar 17 19:10:00.707166 systemd-logind[1424]: Session 17 logged out. Waiting for processes to exit. Mar 17 19:10:00.708390 systemd-logind[1424]: Removed session 17. Mar 17 19:10:00.700000 audit[5416]: CRED_DISP pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.736577 kernel: audit: type=1106 audit(1742238600.700:1438): pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.736895 kernel: audit: type=1104 audit(1742238600.700:1439): pid=5416 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:00.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.16:22-10.200.16.10:45766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:05.840223 systemd[1]: Started sshd@15-10.200.8.16:22-10.200.16.10:45768.service. Mar 17 19:10:05.851848 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 19:10:05.851998 kernel: audit: type=1130 audit(1742238605.839:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.16:22-10.200.16.10:45768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:05.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.16:22-10.200.16.10:45768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:06.473000 audit[5428]: USER_ACCT pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.492846 kernel: audit: type=1101 audit(1742238606.473:1442): pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.475913 sshd[5428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:06.493275 sshd[5428]: Accepted publickey for core from 10.200.16.10 port 45768 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:06.474000 audit[5428]: CRED_ACQ pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.500964 systemd[1]: Started session-18.scope. Mar 17 19:10:06.502118 systemd-logind[1424]: New session 18 of user core. Mar 17 19:10:06.526294 kernel: audit: type=1103 audit(1742238606.474:1443): pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.526418 kernel: audit: type=1006 audit(1742238606.474:1444): pid=5428 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Mar 17 19:10:06.526446 kernel: audit: type=1300 audit(1742238606.474:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe07b01980 a2=3 a3=0 items=0 ppid=1 pid=5428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:06.474000 audit[5428]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe07b01980 a2=3 a3=0 items=0 ppid=1 pid=5428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:06.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:06.548801 kernel: audit: type=1327 audit(1742238606.474:1444): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:06.559829 kernel: audit: type=1105 audit(1742238606.508:1445): pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.508000 audit[5428]: USER_START pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.510000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.583043 kernel: audit: type=1103 audit(1742238606.510:1446): pid=5430 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:06.997995 sshd[5428]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:06.999000 audit[5428]: USER_END pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.002530 systemd[1]: sshd@15-10.200.8.16:22-10.200.16.10:45768.service: Deactivated successfully. Mar 17 19:10:07.003451 systemd[1]: session-18.scope: Deactivated successfully. Mar 17 19:10:07.005002 systemd-logind[1424]: Session 18 logged out. Waiting for processes to exit. Mar 17 19:10:07.006009 systemd-logind[1424]: Removed session 18. Mar 17 19:10:07.020707 kernel: audit: type=1106 audit(1742238606.999:1447): pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.020930 kernel: audit: type=1104 audit(1742238607.000:1448): pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.000000 audit[5428]: CRED_DISP pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.16:22-10.200.16.10:45768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:07.102124 systemd[1]: Started sshd@16-10.200.8.16:22-10.200.16.10:45770.service. Mar 17 19:10:07.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.16:22-10.200.16.10:45770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:07.730000 audit[5439]: USER_ACCT pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.731872 sshd[5439]: Accepted publickey for core from 10.200.16.10 port 45770 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:07.732000 audit[5439]: CRED_ACQ pid=5439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.732000 audit[5439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffebb76ee0 a2=3 a3=0 items=0 ppid=1 pid=5439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:07.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:07.733710 sshd[5439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:07.739137 systemd[1]: Started session-19.scope. Mar 17 19:10:07.739598 systemd-logind[1424]: New session 19 of user core. Mar 17 19:10:07.744000 audit[5439]: USER_START pid=5439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:07.745000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:08.312405 sshd[5439]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:08.313000 audit[5439]: USER_END pid=5439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:08.314000 audit[5439]: CRED_DISP pid=5439 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:08.316394 systemd[1]: sshd@16-10.200.8.16:22-10.200.16.10:45770.service: Deactivated successfully. Mar 17 19:10:08.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.16:22-10.200.16.10:45770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:08.317758 systemd[1]: session-19.scope: Deactivated successfully. Mar 17 19:10:08.318609 systemd-logind[1424]: Session 19 logged out. Waiting for processes to exit. Mar 17 19:10:08.319786 systemd-logind[1424]: Removed session 19. Mar 17 19:10:08.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.16:22-10.200.16.10:33768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:08.420420 systemd[1]: Started sshd@17-10.200.8.16:22-10.200.16.10:33768.service. Mar 17 19:10:09.050000 audit[5448]: USER_ACCT pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:09.050977 sshd[5448]: Accepted publickey for core from 10.200.16.10 port 33768 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:09.051000 audit[5448]: CRED_ACQ pid=5448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:09.051000 audit[5448]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8250a580 a2=3 a3=0 items=0 ppid=1 pid=5448 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:09.051000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:09.052638 sshd[5448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:09.057808 systemd-logind[1424]: New session 20 of user core. Mar 17 19:10:09.058518 systemd[1]: Started session-20.scope. Mar 17 19:10:09.063000 audit[5448]: USER_START pid=5448 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:09.064000 audit[5450]: CRED_ACQ pid=5450 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:11.549753 kernel: kauditd_printk_skb: 20 callbacks suppressed Mar 17 19:10:11.563824 kernel: audit: type=1325 audit(1742238611.542:1465): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.542000 audit[5467]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.542000 audit[5467]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc491c7f70 a2=0 a3=7ffc491c7f5c items=0 ppid=2581 pid=5467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.586697 kernel: audit: type=1300 audit(1742238611.542:1465): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc491c7f70 a2=0 a3=7ffc491c7f5c items=0 ppid=2581 pid=5467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.600680 kernel: audit: type=1327 audit(1742238611.542:1465): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.570000 audit[5467]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.570000 audit[5467]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc491c7f70 a2=0 a3=0 items=0 ppid=2581 pid=5467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.614906 kernel: audit: type=1325 audit(1742238611.570:1466): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.614948 kernel: audit: type=1300 audit(1742238611.570:1466): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc491c7f70 a2=0 a3=0 items=0 ppid=2581 pid=5467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.644074 kernel: audit: type=1327 audit(1742238611.570:1466): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.644246 kernel: audit: type=1325 audit(1742238611.608:1467): table=filter:123 family=2 entries=32 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.608000 audit[5469]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.658021 sshd[5448]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:11.608000 audit[5469]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcdc9362b0 a2=0 a3=7ffcdc93629c items=0 ppid=2581 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.680691 kernel: audit: type=1300 audit(1742238611.608:1467): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcdc9362b0 a2=0 a3=7ffcdc93629c items=0 ppid=2581 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.683567 systemd[1]: sshd@17-10.200.8.16:22-10.200.16.10:33768.service: Deactivated successfully. Mar 17 19:10:11.685425 systemd[1]: session-20.scope: Deactivated successfully. Mar 17 19:10:11.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.686045 systemd-logind[1424]: Session 20 logged out. Waiting for processes to exit. Mar 17 19:10:11.697680 kernel: audit: type=1327 audit(1742238611.608:1467): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.632000 audit[5469]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.698369 systemd-logind[1424]: Removed session 20. Mar 17 19:10:11.709733 kernel: audit: type=1325 audit(1742238611.632:1468): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:11.632000 audit[5469]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcdc9362b0 a2=0 a3=0 items=0 ppid=2581 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:11.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:11.680000 audit[5448]: USER_END pid=5448 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:11.680000 audit[5448]: CRED_DISP pid=5448 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:11.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.16:22-10.200.16.10:33768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:11.763896 systemd[1]: Started sshd@18-10.200.8.16:22-10.200.16.10:33778.service. Mar 17 19:10:11.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.16:22-10.200.16.10:33778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:12.397000 audit[5472]: USER_ACCT pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:12.398001 sshd[5472]: Accepted publickey for core from 10.200.16.10 port 33778 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:12.398000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:12.398000 audit[5472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1fc6c30 a2=3 a3=0 items=0 ppid=1 pid=5472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:12.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:12.399707 sshd[5472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:12.406329 systemd[1]: Started session-21.scope. Mar 17 19:10:12.407262 systemd-logind[1424]: New session 21 of user core. Mar 17 19:10:12.415000 audit[5472]: USER_START pid=5472 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:12.417000 audit[5477]: CRED_ACQ pid=5477 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.012500 sshd[5472]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:13.013000 audit[5472]: USER_END pid=5472 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.013000 audit[5472]: CRED_DISP pid=5472 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.015967 systemd[1]: sshd@18-10.200.8.16:22-10.200.16.10:33778.service: Deactivated successfully. Mar 17 19:10:13.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.16:22-10.200.16.10:33778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:13.017113 systemd[1]: session-21.scope: Deactivated successfully. Mar 17 19:10:13.017904 systemd-logind[1424]: Session 21 logged out. Waiting for processes to exit. Mar 17 19:10:13.018834 systemd-logind[1424]: Removed session 21. Mar 17 19:10:13.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.16:22-10.200.16.10:33780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:13.118959 systemd[1]: Started sshd@19-10.200.8.16:22-10.200.16.10:33780.service. Mar 17 19:10:13.747000 audit[5485]: USER_ACCT pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.748864 sshd[5485]: Accepted publickey for core from 10.200.16.10 port 33780 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:13.749000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.749000 audit[5485]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8ab08750 a2=3 a3=0 items=0 ppid=1 pid=5485 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:13.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:13.750769 sshd[5485]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:13.756927 systemd[1]: Started session-22.scope. Mar 17 19:10:13.757561 systemd-logind[1424]: New session 22 of user core. Mar 17 19:10:13.761000 audit[5485]: USER_START pid=5485 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:13.763000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:14.248536 sshd[5485]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:14.250000 audit[5485]: USER_END pid=5485 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:14.251000 audit[5485]: CRED_DISP pid=5485 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:14.253573 systemd[1]: sshd@19-10.200.8.16:22-10.200.16.10:33780.service: Deactivated successfully. Mar 17 19:10:14.254876 systemd[1]: session-22.scope: Deactivated successfully. Mar 17 19:10:14.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.16:22-10.200.16.10:33780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:14.256091 systemd-logind[1424]: Session 22 logged out. Waiting for processes to exit. Mar 17 19:10:14.257056 systemd-logind[1424]: Removed session 22. Mar 17 19:10:19.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.16:22-10.200.16.10:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:19.359612 systemd[1]: Started sshd@20-10.200.8.16:22-10.200.16.10:43168.service. Mar 17 19:10:19.365319 kernel: kauditd_printk_skb: 27 callbacks suppressed Mar 17 19:10:19.365416 kernel: audit: type=1130 audit(1742238619.359:1490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.16:22-10.200.16.10:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:19.989000 audit[5520]: USER_ACCT pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.010617 sshd[5520]: Accepted publickey for core from 10.200.16.10 port 43168 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:20.011021 kernel: audit: type=1101 audit(1742238619.989:1491): pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.011158 sshd[5520]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:20.009000 audit[5520]: CRED_ACQ pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.022248 systemd[1]: Started session-23.scope. Mar 17 19:10:20.024229 systemd-logind[1424]: New session 23 of user core. Mar 17 19:10:20.042473 kernel: audit: type=1103 audit(1742238620.009:1492): pid=5520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.042625 kernel: audit: type=1006 audit(1742238620.010:1493): pid=5520 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Mar 17 19:10:20.010000 audit[5520]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74140910 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:20.010000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:20.068023 kernel: audit: type=1300 audit(1742238620.010:1493): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74140910 a2=3 a3=0 items=0 ppid=1 pid=5520 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:20.068185 kernel: audit: type=1327 audit(1742238620.010:1493): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:20.068216 kernel: audit: type=1105 audit(1742238620.030:1494): pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.030000 audit[5520]: USER_START pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.036000 audit[5522]: CRED_ACQ pid=5522 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.101271 kernel: audit: type=1103 audit(1742238620.036:1495): pid=5522 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.507773 sshd[5520]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:20.508000 audit[5520]: USER_END pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.510590 systemd[1]: sshd@20-10.200.8.16:22-10.200.16.10:43168.service: Deactivated successfully. Mar 17 19:10:20.511756 systemd[1]: session-23.scope: Deactivated successfully. Mar 17 19:10:20.524460 systemd-logind[1424]: Session 23 logged out. Waiting for processes to exit. Mar 17 19:10:20.525771 systemd-logind[1424]: Removed session 23. Mar 17 19:10:20.508000 audit[5520]: CRED_DISP pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.545793 kernel: audit: type=1106 audit(1742238620.508:1496): pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.545944 kernel: audit: type=1104 audit(1742238620.508:1497): pid=5520 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:20.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.16:22-10.200.16.10:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:20.556000 audit[5533]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:20.556000 audit[5533]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe5a6110f0 a2=0 a3=7ffe5a6110dc items=0 ppid=2581 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:20.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:20.563000 audit[5533]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5533 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 19:10:20.563000 audit[5533]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe5a6110f0 a2=0 a3=7ffe5a6110dc items=0 ppid=2581 pid=5533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:20.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 19:10:24.119747 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.Xt8aFf.mount: Deactivated successfully. Mar 17 19:10:25.612647 systemd[1]: Started sshd@21-10.200.8.16:22-10.200.16.10:43172.service. Mar 17 19:10:25.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.16:22-10.200.16.10:43172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:25.617688 kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 17 19:10:25.617803 kernel: audit: type=1130 audit(1742238625.612:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.16:22-10.200.16.10:43172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:26.253000 audit[5559]: USER_ACCT pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.254909 sshd[5559]: Accepted publickey for core from 10.200.16.10 port 43172 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:26.271679 kernel: audit: type=1101 audit(1742238626.253:1502): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.271000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.272603 sshd[5559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:26.290465 systemd[1]: Started session-24.scope. Mar 17 19:10:26.292710 systemd-logind[1424]: New session 24 of user core. Mar 17 19:10:26.301259 kernel: audit: type=1103 audit(1742238626.271:1503): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.301357 kernel: audit: type=1006 audit(1742238626.271:1504): pid=5559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Mar 17 19:10:26.271000 audit[5559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81c40770 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:26.320872 kernel: audit: type=1300 audit(1742238626.271:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81c40770 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:26.320956 kernel: audit: type=1327 audit(1742238626.271:1504): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:26.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:26.295000 audit[5559]: USER_START pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.344332 kernel: audit: type=1105 audit(1742238626.295:1505): pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.303000 audit[5561]: CRED_ACQ pid=5561 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.359476 kernel: audit: type=1103 audit(1742238626.303:1506): pid=5561 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.820469 sshd[5559]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:26.821000 audit[5559]: USER_END pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.823535 systemd[1]: sshd@21-10.200.8.16:22-10.200.16.10:43172.service: Deactivated successfully. Mar 17 19:10:26.825457 systemd[1]: session-24.scope: Deactivated successfully. Mar 17 19:10:26.826332 systemd-logind[1424]: Session 24 logged out. Waiting for processes to exit. Mar 17 19:10:26.827263 systemd-logind[1424]: Removed session 24. Mar 17 19:10:26.842687 kernel: audit: type=1106 audit(1742238626.821:1507): pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.821000 audit[5559]: CRED_DISP pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.866710 kernel: audit: type=1104 audit(1742238626.821:1508): pid=5559 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:26.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.16:22-10.200.16.10:43172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:28.048542 systemd[1]: run-containerd-runc-k8s.io-8e1ad098335468e6ed2a9e4c843424ac8d87f669621beac3865adcce14c1200d-runc.4S3xvr.mount: Deactivated successfully. Mar 17 19:10:31.927774 systemd[1]: Started sshd@22-10.200.8.16:22-10.200.16.10:41008.service. Mar 17 19:10:31.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.16:22-10.200.16.10:41008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:31.933158 kernel: kauditd_printk_skb: 1 callbacks suppressed Mar 17 19:10:31.933260 kernel: audit: type=1130 audit(1742238631.927:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.16:22-10.200.16.10:41008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:32.561476 sshd[5591]: Accepted publickey for core from 10.200.16.10 port 41008 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:32.560000 audit[5591]: USER_ACCT pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.563186 sshd[5591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:32.581680 kernel: audit: type=1101 audit(1742238632.560:1511): pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.561000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.590289 systemd[1]: Started session-25.scope. Mar 17 19:10:32.591445 systemd-logind[1424]: New session 25 of user core. Mar 17 19:10:32.600687 kernel: audit: type=1103 audit(1742238632.561:1512): pid=5591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.600794 kernel: audit: type=1006 audit(1742238632.561:1513): pid=5591 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Mar 17 19:10:32.561000 audit[5591]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1c986c0 a2=3 a3=0 items=0 ppid=1 pid=5591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:32.626967 kernel: audit: type=1300 audit(1742238632.561:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee1c986c0 a2=3 a3=0 items=0 ppid=1 pid=5591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:32.561000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:32.632788 kernel: audit: type=1327 audit(1742238632.561:1513): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:32.632865 kernel: audit: type=1105 audit(1742238632.592:1514): pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.592000 audit[5591]: USER_START pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.597000 audit[5593]: CRED_ACQ pid=5593 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:32.666307 kernel: audit: type=1103 audit(1742238632.597:1515): pid=5593 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:33.087411 sshd[5591]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:33.088000 audit[5591]: USER_END pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:33.090974 systemd-logind[1424]: Session 25 logged out. Waiting for processes to exit. Mar 17 19:10:33.092340 systemd[1]: sshd@22-10.200.8.16:22-10.200.16.10:41008.service: Deactivated successfully. Mar 17 19:10:33.093191 systemd[1]: session-25.scope: Deactivated successfully. Mar 17 19:10:33.094538 systemd-logind[1424]: Removed session 25. Mar 17 19:10:33.088000 audit[5591]: CRED_DISP pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:33.124764 kernel: audit: type=1106 audit(1742238633.088:1516): pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:33.124901 kernel: audit: type=1104 audit(1742238633.088:1517): pid=5591 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:33.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.16:22-10.200.16.10:41008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:36.771000 audit[4366]: AVC avc: denied { watch } for pid=4366 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.2215373127/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c833,c943 tclass=file permissive=0 Mar 17 19:10:36.771000 audit[4366]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a183e0 a2=fc6 a3=0 items=0 ppid=3800 pid=4366 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c833,c943 key=(null) Mar 17 19:10:36.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:10:37.043000 audit[4479]: AVC avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:10:37.047638 kernel: kauditd_printk_skb: 4 callbacks suppressed Mar 17 19:10:37.047754 kernel: audit: type=1400 audit(1742238637.043:1520): avc: denied { watch } for pid=4479 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_19_07_17.236753456/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c342,c641 tclass=file permissive=0 Mar 17 19:10:37.043000 audit[4479]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015f2c20 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:10:37.088323 kernel: audit: type=1300 audit(1742238637.043:1520): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015f2c20 a2=fc6 a3=0 items=0 ppid=3972 pid=4479 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c342,c641 key=(null) Mar 17 19:10:37.088489 kernel: audit: type=1327 audit(1742238637.043:1520): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:10:37.043000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 19:10:38.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.16:22-10.200.16.10:41018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:38.178371 systemd[1]: Started sshd@23-10.200.8.16:22-10.200.16.10:41018.service. Mar 17 19:10:38.195693 kernel: audit: type=1130 audit(1742238638.178:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.16:22-10.200.16.10:41018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:38.823000 audit[5619]: USER_ACCT pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.824137 sshd[5619]: Accepted publickey for core from 10.200.16.10 port 41018 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:38.842700 kernel: audit: type=1101 audit(1742238638.823:1522): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.843447 sshd[5619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:38.842000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.849279 systemd[1]: Started session-26.scope. Mar 17 19:10:38.850281 systemd-logind[1424]: New session 26 of user core. Mar 17 19:10:38.860674 kernel: audit: type=1103 audit(1742238638.842:1523): pid=5619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.842000 audit[5619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2fe826c0 a2=3 a3=0 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:38.886616 kernel: audit: type=1006 audit(1742238638.842:1524): pid=5619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Mar 17 19:10:38.886722 kernel: audit: type=1300 audit(1742238638.842:1524): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2fe826c0 a2=3 a3=0 items=0 ppid=1 pid=5619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:38.886762 kernel: audit: type=1327 audit(1742238638.842:1524): proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:38.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:38.855000 audit[5619]: USER_START pid=5619 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.909971 kernel: audit: type=1105 audit(1742238638.855:1525): pid=5619 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:38.857000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:39.332308 sshd[5619]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:39.333000 audit[5619]: USER_END pid=5619 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:39.333000 audit[5619]: CRED_DISP pid=5619 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:39.336190 systemd[1]: sshd@23-10.200.8.16:22-10.200.16.10:41018.service: Deactivated successfully. Mar 17 19:10:39.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.16:22-10.200.16.10:41018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:39.337364 systemd[1]: session-26.scope: Deactivated successfully. Mar 17 19:10:39.338127 systemd-logind[1424]: Session 26 logged out. Waiting for processes to exit. Mar 17 19:10:39.339149 systemd-logind[1424]: Removed session 26. Mar 17 19:10:42.520000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:42.525007 kernel: kauditd_printk_skb: 4 callbacks suppressed Mar 17 19:10:42.525137 kernel: audit: type=1400 audit(1742238642.520:1531): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:42.520000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:42.556291 kernel: audit: type=1400 audit(1742238642.520:1530): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:42.556409 kernel: audit: type=1300 audit(1742238642.520:1531): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b43800 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:42.520000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b43800 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:42.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:42.594388 kernel: audit: type=1327 audit(1742238642.520:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:42.594542 kernel: audit: type=1300 audit(1742238642.520:1530): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fb4640 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:42.520000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fb4640 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:42.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:42.632598 kernel: audit: type=1327 audit(1742238642.520:1530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:43.237000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.255895 kernel: audit: type=1400 audit(1742238643.237:1532): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.256046 kernel: audit: type=1400 audit(1742238643.237:1533): avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.237000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7344 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.271784 kernel: audit: type=1300 audit(1742238643.237:1532): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df27b60 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.237000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df27b60 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.291295 kernel: audit: type=1327 audit(1742238643.237:1532): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.238000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.238000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0061d5320 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.238000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.237000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00d693ad0 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.270000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7350 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.270000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.270000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df27e00 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.270000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00d693b00 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:43.270000 audit[2294]: AVC avc: denied { watch } for pid=2294 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:43.270000 audit[2294]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0082ca560 a2=fc6 a3=0 items=0 ppid=2156 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c498,c925 key=(null) Mar 17 19:10:43.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Mar 17 19:10:44.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.16:22-10.200.16.10:39502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:44.439569 systemd[1]: Started sshd@24-10.200.8.16:22-10.200.16.10:39502.service. Mar 17 19:10:45.068000 audit[5636]: USER_ACCT pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.069346 sshd[5636]: Accepted publickey for core from 10.200.16.10 port 39502 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:45.069000 audit[5636]: CRED_ACQ pid=5636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.069000 audit[5636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff374eb860 a2=3 a3=0 items=0 ppid=1 pid=5636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:45.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:45.071076 sshd[5636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:45.076367 systemd-logind[1424]: New session 27 of user core. Mar 17 19:10:45.076932 systemd[1]: Started session-27.scope. Mar 17 19:10:45.081000 audit[5636]: USER_START pid=5636 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.082000 audit[5638]: CRED_ACQ pid=5638 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.583172 sshd[5636]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:45.584000 audit[5636]: USER_END pid=5636 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.584000 audit[5636]: CRED_DISP pid=5636 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:45.586556 systemd[1]: sshd@24-10.200.8.16:22-10.200.16.10:39502.service: Deactivated successfully. Mar 17 19:10:45.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.16:22-10.200.16.10:39502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:45.587666 systemd[1]: session-27.scope: Deactivated successfully. Mar 17 19:10:45.588450 systemd-logind[1424]: Session 27 logged out. Waiting for processes to exit. Mar 17 19:10:45.589396 systemd-logind[1424]: Removed session 27. Mar 17 19:10:49.173000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.178395 kernel: kauditd_printk_skb: 25 callbacks suppressed Mar 17 19:10:49.178500 kernel: audit: type=1400 audit(1742238649.173:1547): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.173000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.210999 kernel: audit: type=1400 audit(1742238649.173:1548): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.211144 kernel: audit: type=1300 audit(1742238649.173:1548): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef160 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.173000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef160 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.232938 kernel: audit: type=1327 audit(1742238649.173:1548): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.173000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.174000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.265320 kernel: audit: type=1400 audit(1742238649.174:1549): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.265482 kernel: audit: type=1300 audit(1742238649.174:1549): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef3a0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.174000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef3a0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.174000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.303827 kernel: audit: type=1327 audit(1742238649.174:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.304755 kernel: audit: type=1400 audit(1742238649.174:1550): avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.174000 audit[2354]: AVC avc: denied { watch } for pid=2354 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7342 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 19:10:49.174000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef740 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.340072 kernel: audit: type=1300 audit(1742238649.174:1550): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009ef740 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.340225 kernel: audit: type=1327 audit(1742238649.174:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.174000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:49.173000 audit[2354]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000fb4ce0 a2=fc6 a3=0 items=0 ppid=2210 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c931 key=(null) Mar 17 19:10:49.173000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 19:10:50.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.16:22-10.200.16.10:37742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:50.691523 systemd[1]: Started sshd@25-10.200.8.16:22-10.200.16.10:37742.service. Mar 17 19:10:51.333000 audit[5668]: USER_ACCT pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.334292 sshd[5668]: Accepted publickey for core from 10.200.16.10 port 37742 ssh2: RSA SHA256:4lz3AVC5ESuijCWyVe68PdTUtpte7kghS3r+sVRnQ+c Mar 17 19:10:51.334000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.334000 audit[5668]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2bef3d70 a2=3 a3=0 items=0 ppid=1 pid=5668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 19:10:51.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 19:10:51.335961 sshd[5668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 19:10:51.340835 systemd-logind[1424]: New session 28 of user core. Mar 17 19:10:51.341616 systemd[1]: Started session-28.scope. Mar 17 19:10:51.346000 audit[5668]: USER_START pid=5668 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.347000 audit[5670]: CRED_ACQ pid=5670 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.834454 sshd[5668]: pam_unix(sshd:session): session closed for user core Mar 17 19:10:51.835000 audit[5668]: USER_END pid=5668 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.835000 audit[5668]: CRED_DISP pid=5668 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 19:10:51.837943 systemd[1]: sshd@25-10.200.8.16:22-10.200.16.10:37742.service: Deactivated successfully. Mar 17 19:10:51.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.16:22-10.200.16.10:37742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 19:10:51.839072 systemd[1]: session-28.scope: Deactivated successfully. Mar 17 19:10:51.839886 systemd-logind[1424]: Session 28 logged out. Waiting for processes to exit. Mar 17 19:10:51.840828 systemd-logind[1424]: Removed session 28. Mar 17 19:10:54.122792 systemd[1]: run-containerd-runc-k8s.io-8ede84baa3f39663ef7c5babe1492611de91eb1280fb9aa900dfbc0670b65398-runc.DyPhJA.mount: Deactivated successfully.